{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T16:41:27Z","timestamp":1772988087598,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["IIS-1513692"],"award-info":[{"award-number":["IIS-1513692"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["IIS-1615706"],"award-info":[{"award-number":["IIS-1615706"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,2]]},"DOI":"10.1145\/3159652.3159700","type":"proceedings-article","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T18:12:23Z","timestamp":1517940743000},"page":"513-521","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Short-Term Satisfaction and Long-Term Coverage"],"prefix":"10.1145","author":[{"given":"Tobias","family":"Schnabel","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Paul N.","family":"Bennett","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Susan T.","family":"Dumais","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Thorsten","family":"Joachims","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800183"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741109"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365964"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2567766"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454038"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/359784.359836"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642713"},{"key":"e_1_3_2_1_8_1","volume-title":"Alessandro Vittorio Papadopoulos, and Roberto Turrin","author":"Cremonesi Paolo","year":"2011","unstructured":"Paolo Cremonesi , Franca Garzotto , Sara Negro , Alessandro Vittorio Papadopoulos, and Roberto Turrin . 2011 . Looking for 'good' recommendations: A comparative evaluation of recommender systems INTERACT. Paolo Cremonesi, Franca Garzotto, Sara Negro, Alessandro Vittorio Papadopoulos, and Roberto Turrin . 2011. Looking for 'good' recommendations: A comparative evaluation of recommender systems INTERACT."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Paolo Cremonesi Franca Garzotto and Roberto Turrin . 2013. User-centric vs. system-centric evaluation of recommender systems INTERACT.  Paolo Cremonesi Franca Garzotto and Roberto Turrin . 2013. User-centric vs. system-centric evaluation of recommender systems INTERACT.","DOI":"10.1007\/978-3-642-40477-1_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645737"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1059981.1059982"},{"key":"e_1_3_2_1_12_1","unstructured":"Mouzhi Ge Dietmar Jannach Fatih Gedikli and Martin Hepp . 2012. Effects of the Placement of Diverse Items in Recommendation Lists ICEIS.  Mouzhi Ge Dietmar Jannach Fatih Gedikli and Martin Hepp . 2012. Effects of the Placement of Diverse Items in Recommendation Lists ICEIS."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187914"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390352"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2882592.2882594"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.02.013"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Bal\u00e1zs Hidasi Massimo Quadrana Alexandros Karatzoglou and Domonkos Tikk . 2016. Parallel recurrent neural network architectures for feature-rich session-based recommendations RecSys.  Bal\u00e1zs Hidasi Massimo Quadrana Alexandros Karatzoglou and Domonkos Tikk . 2016. Parallel recurrent neural network architectures for feature-rich session-based recommendations RecSys.","DOI":"10.1145\/2959100.2959167"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979125"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800176"},{"key":"e_1_3_2_1_22_1","unstructured":"Dietmar Jannach Lukas Lerche and Michael Jugovac . 2015 b. Item Familiarity Effects in User-Centric Evaluations of Recommender Systems. (2015).  Dietmar Jannach Lukas Lerche and Michael Jugovac . 2015 b. Item Familiarity Effects in User-Centric Evaluations of Recommender Systems. (2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229179.1229181"},{"key":"e_1_3_2_1_24_1","unstructured":"Nicolas Jones and Pearl Pu . 2007. User technology adoption issues in recommender systems NAEC.  Nicolas Jones and Pearl Pu . 2007. User technology adoption issues in recommender systems NAEC."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9118-4"},{"key":"e_1_3_2_1_27_1","article-title":"Algorithms for the multi-armed bandit problem","volume":"47","author":"Kuleshov Volodymyr","year":"2010","unstructured":"Volodymyr Kuleshov and Precup Doina . 2010 . Algorithms for the multi-armed bandit problem . Journal of Machine Learning Vol. 47 , 1 (2010). Volodymyr Kuleshov and Precup Doina . 2010. Algorithms for the multi-armed bandit problem. Journal of Machine Learning Vol. 47, 1 (2010).","journal-title":"Journal of Machine Learning"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"e_1_3_2_1_29_1","volume-title":"Conducting behavioral research on Amazon's Mechanical Turk. Behavior Research Methods","author":"Mason Winter","year":"2012","unstructured":"Winter Mason and Siddharth Suri . 2012. Conducting behavioral research on Amazon's Mechanical Turk. Behavior Research Methods Vol. 44 , 1 ( 2012 ). Winter Mason and Siddharth Suri . 2012. Conducting behavioral research on Amazon's Mechanical Turk. Behavior Research Methods Vol. 44, 1 (2012)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2043962"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458092"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/502716.502737"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245121"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883012"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000018"},{"key":"e_1_3_2_1_36_1","volume-title":"Recommender Systems Handbook. (bibinfoedition","author":"Shapira Bracha","unstructured":"Bracha Shapira , Francesco Ricci , Paul B Kantor , and Lior Rokach . 2015. Recommender Systems Handbook. (bibinfoedition 2 nd ed.). Springer . Bracha Shapira, Francesco Ricci, Paul B Kantor, and Lior Rokach . 2015. Recommender Systems Handbook. (bibinfoedition2nd ed.). Springer.","edition":"2"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506619"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2792840"},{"key":"e_1_3_2_1_39_1","volume-title":"Counterfactual risk minimization: Learning from logged bandit feedback Proceedings of the 32nd International Conference on Machine Learning. 814--823","author":"Swaminathan Adith","unstructured":"Adith Swaminathan and Thorsten Joachims . 2015. Counterfactual risk minimization: Learning from logged bandit feedback Proceedings of the 32nd International Conference on Machine Learning. 814--823 . Adith Swaminathan and Thorsten Joachims . 2015. Counterfactual risk minimization: Learning from logged bandit feedback Proceedings of the 32nd International Conference on Machine Learning. 814--823."},{"key":"e_1_3_2_1_40_1","volume-title":"Beyond Algorithms: An HCI Perspective on Recommender Systems SIGIR Workshops.","author":"Swearingen K.","year":"2001","unstructured":"K. Swearingen and R. Sinha . 2001 . Beyond Algorithms: An HCI Perspective on Recommender Systems SIGIR Workshops. K. Swearingen and R. Sinha . 2001. Beyond Algorithms: An HCI Perspective on Recommender Systems SIGIR Workshops."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383992"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362395"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959174"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060754"}],"event":{"name":"WSDM 2018: The Eleventh ACM International Conference on Web Search and Data Mining","location":"Marina Del Rey CA USA","acronym":"WSDM 2018","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3159652.3159700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3159652.3159700","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3159652.3159700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:12Z","timestamp":1750213572000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3159652.3159700"}},"subtitle":["Understanding How Users Tolerate Algorithmic Exploration"],"short-title":[],"issued":{"date-parts":[[2018,2,2]]},"references-count":44,"alternative-id":["10.1145\/3159652.3159700","10.1145\/3159652"],"URL":"https:\/\/doi.org\/10.1145\/3159652.3159700","relation":{},"subject":[],"published":{"date-parts":[[2018,2,2]]},"assertion":[{"value":"2018-02-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}