{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:26:33Z","timestamp":1764174393156,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T00:00:00Z","timestamp":1494288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["16202215"],"award-info":[{"award-number":["16202215"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"name":"RGC","award":["16202215"],"award-info":[{"award-number":["16202215"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,9]]},"DOI":"10.1145\/3035918.3064020","type":"proceedings-article","created":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T18:09:00Z","timestamp":1494439740000},"page":"851-865","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Feedback-Aware Social Event-Participant Arrangement"],"prefix":"10.1145","author":[{"given":"Jieying","family":"She","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]},{"given":"Yongxin","family":"Tong","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]},{"given":"Tianshu","family":"Song","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2017,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"127","volume-title":"ICML'13","author":"Agrawal S.","unstructured":"S. Agrawal and N. Goyal . Thompson sampling for contextual bandits with linear payoffs . In ICML'13 , pages 127 -- 135 . S. Agrawal and N. Goyal. Thompson sampling for contextual bandits with linear payoffs. In ICML'13, pages 127--135."},{"key":"e_1_3_2_1_2_1","volume-title":"Thompson sampling for contextual bandits with linear payoffs. arXiv preprint arXiv:1209.3352","author":"Agrawal S.","year":"2012","unstructured":"S. Agrawal and N. Goyal . Thompson sampling for contextual bandits with linear payoffs. arXiv preprint arXiv:1209.3352 , 2012 . S. Agrawal and N. Goyal. Thompson sampling for contextual bandits with linear payoffs. arXiv preprint arXiv:1209.3352, 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1987.1104491"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749450"},{"key":"e_1_3_2_1_5_1","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer P.","year":"2002","unstructured":"P. Auer . Using confidence bounds for exploitation-exploration trade-offs . The Journal of Machine Learning Research , 3 : 397 -- 422 , 2002 . P. Auer. Using confidence bounds for exploitation-exploration trade-offs. The Journal of Machine Learning Research, 3:397--422, 2002.","journal-title":"The Journal of Machine Learning Research"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3711-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1508120"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0613"},{"key":"e_1_3_2_1_9_1","first-page":"2249","volume-title":"NIPS'11","author":"Chapelle O.","unstructured":"O. Chapelle and L. Li . An empirical evaluation of thompson sampling . In NIPS'11 , pages 2249 -- 2257 . O. Chapelle and L. Li. An empirical evaluation of thompson sampling. In NIPS'11, pages 2249--2257."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.11.013"},{"key":"e_1_3_2_1_11_1","first-page":"151","volume-title":"ICML'13","author":"Chen W.","unstructured":"W. Chen , Y. Wang , and Y. Yuan . Combinatorial multi-armed bandit: General framework and applications . In ICML'13 , pages 151 -- 159 . W. Chen, Y. Wang, and Y. Yuan. Combinatorial multi-armed bandit: General framework and applications. In ICML'13, pages 151--159."},{"key":"e_1_3_2_1_12_1","volume-title":"Combinatorial multi-armed bandit and its extension to probabilistically triggered arms","author":"Chen W.","year":"2014","unstructured":"W. Chen , Y. Wang , and Y. Yuan . Combinatorial multi-armed bandit and its extension to probabilistically triggered arms . 2014 . W. Chen, Y. Wang, and Y. Yuan. Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. 2014."},{"key":"e_1_3_2_1_13_1","first-page":"208","volume-title":"AISTATS'11","author":"Chu W.","unstructured":"W. Chu , L. Li , L. Reyzin , and R. E. Schapire . Contextual bandits with linear payoff functions . In AISTATS'11 , pages 208 -- 214 . W. Chu, L. Li, L. Reyzin, and R. E. Schapire. Contextual bandits with linear payoff functions. In AISTATS'11, pages 208--214."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2612173"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2181864"},{"key":"e_1_3_2_1_16_1","first-page":"100","volume-title":"ICML'14","author":"Gopalan A.","unstructured":"A. Gopalan , S. Mannor , and Y. Mansour . Thompson sampling for complex online problems . In ICML'14 , pages 100 -- 108 . A. Gopalan, S. Mannor, and Y. Mansour. Thompson sampling for complex online problems. In ICML'14, pages 100--108."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw059"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100262"},{"key":"e_1_3_2_1_19_1","volume-title":"Biometrika","author":"Kendall M. G.","year":"1938","unstructured":"M. G. Kendall . A new measure of rank correlation . Biometrika , 1938 . M. G. Kendall. A new measure of rank correlation. Biometrika, 1938."},{"key":"e_1_3_2_1_20_1","first-page":"589","volume-title":"ESA'13","author":"Kesselheim T.","unstructured":"T. Kesselheim , K. Radke , A. T\u00f6nnis , and B. V\u00f6cking . An optimal online algorithm for weighted bipartite matching and extensions to combinatorial auctions . In ESA'13 , pages 589 -- 600 . T. Kesselheim, K. Radke, A. T\u00f6nnis, and B. V\u00f6cking. An optimal online algorithm for weighted bipartite matching and extensions to combinatorial auctions. In ESA'13, pages 589--600."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507171"},{"key":"e_1_3_2_1_22_1","volume-title":"Contextual semibandits via supervised learning oracles","author":"Krishnamurthy A.","year":"2015","unstructured":"A. Krishnamurthy , A. Agarwal , and M. Dudik . Contextual semibandits via supervised learning oracles . 2015 . A. Krishnamurthy, A. Agarwal, and M. Dudik. Contextual semibandits via supervised learning oracles. 2015."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_3_2_1_24_1","first-page":"817","volume-title":"NIPS'08","author":"Langford J.","unstructured":"J. Langford and T. Zhang . The epoch-greedy algorithm for multi-armed bandits with side information . In NIPS'08 , pages 817 -- 824 . J. Langford and T. Zhang. The epoch-greedy algorithm for multi-armed bandits with side information. In NIPS'08, pages 817--824."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623724"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_27_1","first-page":"1245","volume-title":"ICML'16","author":"Li S.","unstructured":"S. Li , B. Wang , S. Zhang , and W. Chen . Contextual combinatorial cascading bandits . In ICML'16 , pages 1245 -- 1253 . S. Li, B. Wang, S. Zhang, and W. Chen. Contextual combinatorial cascading bandits. In ICML'16, pages 1245--1253."},{"key":"e_1_3_2_1_28_1","first-page":"901","volume-title":"ICML'14","author":"Lin T.","unstructured":"T. Lin , B. D. Abrahao , R. D. Kleinberg , J. Lui , and W. Chen . Combinatorial partial monitoring game with linear feedback and its applications . In ICML'14 , pages 901 -- 909 . T. Lin, B. D. Abrahao, R. D. Kleinberg, J. Lui, and W. Chen. Combinatorial partial monitoring game with linear feedback and its applications. In ICML'14, pages 901--909."},{"key":"e_1_3_2_1_29_1","first-page":"1968","volume-title":"ICASSP'11","author":"Liu H.","unstructured":"H. Liu , K. Liu , and Q. Zhao . Logarithmic weak regret of non-bayesian restless multi-armed bandit . In ICASSP'11 , pages 1968 -- 1971 . H. Liu, K. Liu, and Q. Zhao. Logarithmic weak regret of non-bayesian restless multi-armed bandit. In ICASSP'11, pages 1968--1971."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339693"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.64"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800187"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000057"},{"key":"e_1_3_2_1_34_1","first-page":"567","volume-title":"ICDE'15","author":"Pham T.-A. N.","unstructured":"T.-A. N. Pham , X. Li , G. Cong , and Z. Zhang . A general graph-based model for recommendation in event-based social networks . In ICDE'15 , pages 567 -- 578 . T.-A. N. Pham, X. Li, G. Cong, and Z. Zhang. A general graph-based model for recommendation in event-based social networks. In ICDE'15, pages 567--578."},{"key":"e_1_3_2_1_35_1","first-page":"145","volume-title":"AAAI'14","author":"Qiao Z.","unstructured":"Z. Qiao , P. Zhang , Y. Cao , C. Zhou , L. Guo , and B. Fang . Combining heterogenous social and geographical information for event recommendation . In AAAI'14 , pages 145 -- 151 . Z. Qiao, P. Zhang, Y. Cao, C. Zhou, L. Guo, and B. Fang. Combining heterogenous social and geographical information for event recommendation. In AAAI'14, pages 145--151."},{"key":"e_1_3_2_1_36_1","first-page":"461","volume-title":"SDM'14","author":"Qin L.","unstructured":"L. Qin , S. Chen , and X. Zhu . Contextual combinatorial bandit and its application on diversified online recommendation . In SDM'14 , pages 461 -- 469 . L. Qin, S. Chen, and X. Zhu. Contextual combinatorial bandit and its application on diversified online recommendation. In SDM'14, pages 461--469."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749446"},{"key":"e_1_3_2_1_38_1","first-page":"735","volume-title":"ICDE'15","author":"She J.","unstructured":"J. She , Y. Tong , L. Chen , and C. C. Cao . Conflict-aware event-participant arrangement . In ICDE'15 , pages 735 -- 746 . J. She, Y. Tong, L. Chen, and C. C. Cao. Conflict-aware event-participant arrangement. In ICDE'15, pages 735--746."},{"key":"e_1_3_2_1_39_1","volume-title":"Transactions on Knowledge and Data Engineering","author":"She J.","year":"2016","unstructured":"J. She , Y. Tong , L. Chen , and C. C. Cao . Utility-aware social event-participant planning and its variant for online setting . Transactions on Knowledge and Data Engineering , 2016 . J. She, Y. Tong, L. Chen, and C. C. Cao. Utility-aware social event-participant planning and its variant for online setting. Transactions on Knowledge and Data Engineering, 2016."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398592"},{"key":"e_1_3_2_1_41_1","volume-title":"Biometrika","author":"Thompson W. R.","year":"1933","unstructured":"W. R. Thompson . On the likelihood that one unknown probability exceeds another in view of the evidence of two samples . Biometrika , 1933 . W. R. Thompson. On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika, 1933."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.05.032"},{"key":"e_1_3_2_1_43_1","first-page":"49","volume-title":"ICDE'16","author":"Tong Y.","unstructured":"Y. Tong , J. She , B. Ding , L. Wang , and L. Chen . Online mobile micro-task allocation in spatial crowdsourcing . In ICDE'16 , pages 49 -- 60 . Y. Tong, J. She, B. Ding, L. Wang, and L. Chen. Online mobile micro-task allocation in spatial crowdsourcing. In ICDE'16, pages 49--60."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-015-0377-6"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735886.1735888"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376621"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11564096_42"},{"key":"e_1_3_2_1_48_1","first-page":"591","volume-title":"AUAI'09","author":"Walsh T. J.","unstructured":"T. J. Walsh , I. Szita , C. Diuk , and M. L. Littman . Exploring compact reinforcement-learning representations with linear regression . In AUAI'09 , pages 591 -- 598 . T. J. Walsh, I. Szita, C. Diuk, and M. L. Littman. Exploring compact reinforcement-learning representations with linear regression. In AUAI'09, pages 591--598."},{"volume-title":"ICML'15","author":"Wen Z.","key":"e_1_3_2_1_49_1","unstructured":"Z. Wen , A. Ashkan , H. Eydgahi , and B. Kveton . Efficient learning in large-scale combinatorial semi-bandits . In ICML'15 . Z. Wen, A. Ashkan, H. Eydgahi, and B. Kveton. Efficient learning in large-scale combinatorial semi-bandits. In ICML'15."},{"key":"e_1_3_2_1_50_1","first-page":"579","volume-title":"VLDB'07","author":"Wong R. C.-W.","unstructured":"R. C.-W. Wong , Y. Tao , A. W.-C. Fu , and X. Xiao . On efficient spatial matching . In VLDB'07 , pages 579 -- 590 . R. C.-W. Wong, Y. Tao, A. W.-C. Fu, and X. Xiao. On efficient spatial matching. In VLDB'07, pages 579--590."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663356"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487608"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805839"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783336"}],"event":{"name":"SIGMOD\/PODS'17: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Chicago Illinois USA","acronym":"SIGMOD\/PODS'17"},"container-title":["Proceedings of the 2017 ACM International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3064020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3035918.3064020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:41Z","timestamp":1750217801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3064020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,9]]},"references-count":54,"alternative-id":["10.1145\/3035918.3064020","10.1145\/3035918"],"URL":"https:\/\/doi.org\/10.1145\/3035918.3064020","relation":{},"subject":[],"published":{"date-parts":[[2017,5,9]]},"assertion":[{"value":"2017-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}