{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:24:21Z","timestamp":1762352661111,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T00:00:00Z","timestamp":1520208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,5]]},"DOI":"10.1145\/3172944.3172967","type":"proceedings-article","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T13:28:34Z","timestamp":1520602114000},"page":"19-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Ensemble Recommendations via Thompson Sampling"],"prefix":"10.1145","author":[{"given":"Bj\u00f6rn","family":"Brod\u00e9n","sequence":"first","affiliation":[{"name":"Apptus Technologies, Lund, Sweden"}]},{"given":"Mikael","family":"Hammar","sequence":"additional","affiliation":[{"name":"Apptus Technologies, Lund, Sweden"}]},{"given":"Bengt J.","family":"Nilsson","sequence":"additional","affiliation":[{"name":"Malm\u00f6 University, Malm\u00f6, Sweden"}]},{"given":"Dimitris","family":"Paraschakis","sequence":"additional","affiliation":[{"name":"Malm\u00f6 University, Malm\u00f6, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2018,3,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461256.2461277"},{"volume-title":"Recommender Systems for Online Dating. Master's thesis","author":"Andrews Eric","key":"e_1_3_2_1_2_1","unstructured":"Eric Andrews . 2015. Recommender Systems for Online Dating. Master's thesis . University of Helsinki . Eric Andrews. 2015. Recommender Systems for Online Dating. Master's thesis. University of Helsinki."},{"key":"e_1_3_2_1_3_1","volume-title":"Regret Bounds and Minimax Policies Under Partial Monitoring. J. Mach. Learn. Res. 11 (Dec","author":"Audibert Jean-Yves","year":"2010","unstructured":"Jean-Yves Audibert and S\u00e9bastien Bubeck . 2010. Regret Bounds and Minimax Policies Under Partial Monitoring. J. Mach. Learn. Res. 11 (Dec . 2010 ), 2785--2836. Jean-Yves Audibert and S\u00e9bastien Bubeck. 2010. Regret Bounds and Minimax Policies Under Partial Monitoring. J. Mach. Learn. Res. 11 (Dec. 2010), 2785--2836."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_1_5_1","volume-title":"Barger and Lauren Labrecque","author":"Viktor","year":"2013","unstructured":"Viktor A. Barger and Lauren Labrecque . 2013 . An Integrated Marketing Communications Perspective on Social Media Metrics. International Journal of Integrated Marketing Communications (May 2013), 31. Viktor A. Barger and Lauren Labrecque. 2013. An Integrated Marketing Communications Perspective on Social Media Metrics. International Journal of Integrated Marketing Communications (May 2013), 31."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2798723"},{"key":"e_1_3_2_1_7_1","volume-title":"M\u00fcller","author":"Bernardi Lucas","year":"2015","unstructured":"Lucas Bernardi , Jaap Kamps , Julia Kiseleva , and Melanie J. I . M\u00fcller . 2015 . The Continuous Cold Start Problem in e-Commerce Recommender Systems. CoRR abs\/1508.01177 (June 2015). Lucas Bernardi, Jaap Kamps, Julia Kiseleva, and Melanie J. I. M\u00fcller. 2015. The Continuous Cold Start Problem in e-Commerce Recommender Systems. CoRR abs\/1508.01177 (June 2015)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.02.052"},{"key":"e_1_3_2_1_9_1","volume-title":"Neural Information Processing: 21st International Conference, ICONIP","author":"Bouneffouf Djallel","year":"2014","unstructured":"Djallel Bouneffouf , Romain Laroche , Tanguy Urvoy , Raphael Feraud , and Robin Allesiardo . 2014. Contextual Bandit for Active Learning: Active Thompson Sampling . In Neural Information Processing: 21st International Conference, ICONIP 2014 , Kuching, Malaysia, November 3--6, 2014. Proceedings, Part I, Chu Kiong Loo, Keem Siah Yap, Kok Wai Wong, Andrew Teoh, and Kaizhu Huang (Eds.). Springer International Publishing , 405--412. Djallel Bouneffouf, Romain Laroche, Tanguy Urvoy, Raphael Feraud, and Robin Allesiardo. 2014. Contextual Bandit for Active Learning: Active Thompson Sampling. In Neural Information Processing: 21st International Conference, ICONIP 2014, Kuching, Malaysia, November 3--6, 2014. Proceedings, Part I, Chu Kiong Loo, Keem Siah Yap, Kok Wai Wong, Andrew Teoh, and Kaizhu Huang (Eds.). Springer International Publishing, 405--412."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005458706300636"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501029"},{"volume-title":"Advances in Neural Information Processing Systems 24","author":"Chapelle Olivier","key":"e_1_3_2_1_12_1","unstructured":"Olivier Chapelle and Lihong Li. 2011. An Empirical Evaluation of Thompson Sampling . In Advances in Neural Information Processing Systems 24 , J. Shawe-Taylor, R. S. Zemel, P. L. Bartlett, F. Pereira, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 2249--2257. Olivier Chapelle and Lihong Li. 2011. An Empirical Evaluation of Thompson Sampling. In Advances in Neural Information Processing Systems 24, J. Shawe-Taylor, R. S. Zemel, P. L. Bartlett, F. Pereira, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2249--2257."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079681"},{"key":"e_1_3_2_1_14_1","volume-title":"The KL-UCB Algorithm for Bounded Stochastic Bandits and Beyond. In The 24th Annual Conference on Learning Theory. 359--376","author":"Garivier Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Garivier and Olivier Capp\u00e9 . 2011 . The KL-UCB Algorithm for Bounded Stochastic Bandits and Beyond. In The 24th Annual Conference on Learning Theory. 359--376 . Aur\u00e9lien Garivier and Olivier Capp\u00e9. 2011. The KL-UCB Algorithm for Bounded Stochastic Bandits and Beyond. In The 24th Annual Conference on Learning Theory. 359--376."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2050345.2050365"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 31st International Conference on International Conference on Machine Learning -","volume":"32","author":"Gopalan Aditya","year":"2014","unstructured":"Aditya Gopalan , Shie Mannor , and Yishay Mansour . 2014 . Thompson Sampling for Complex Online Problems . In Proceedings of the 31st International Conference on International Conference on Machine Learning - Volume 32 (ICML'14). JMLR.org, I--100--I--108. Aditya Gopalan, Shie Mannor, and Yishay Mansour. 2014. Thompson Sampling for Complex Online Problems. In Proceedings of the 31st International Conference on International Conference on Machine Learning - Volume 32 (ICML'14). JMLR.org, I--100--I--108."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2832747.2832852"},{"key":"e_1_3_2_1_19_1","volume-title":"NIPS 2006 Workshop.","author":"Hartland C\u00e9dric","year":"2006","unstructured":"C\u00e9dric Hartland , Sylvain Gelly , Nicolas Baskiotis , Olivier Teytaud , and Mich\u00e9le Sebag . 2006 . Multi-Armed Bandit, Dynamic Environments and Meta-Bandits. In Online Trading of Exploration and Exploitation , NIPS 2006 Workshop. C\u00e9dric Hartland, Sylvain Gelly, Nicolas Baskiotis, Olivier Teytaud, and Mich\u00e9le Sebag. 2006. Multi-Armed Bandit, Dynamic Environments and Meta-Bandits. In Online Trading of Exploration and Exploitation, NIPS 2006 Workshop."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695748"},{"key":"e_1_3_2_1_21_1","unstructured":"Varun Kanade Brendan Mcmahan and Bryan Brent. 2009. Sleeping Experts and Bandits with Stochastic Action Availability and Adversarial Rewards. In In Proceedings of the Twelfth International Conference on Artificial Intelligence and Statistics number 5. 272--279.  Varun Kanade Brendan Mcmahan and Bryan Brent. 2009. Sleeping Experts and Bandits with Stochastic Action Availability and Adversarial Rewards. In In Proceedings of the Twelfth International Conference on Artificial Intelligence and Statistics number 5. 272--279."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34106-9_18"},{"volume-title":"Advances in Neural Information Processing Systems 28. Curran Associates","author":"Kawale Jaya","key":"e_1_3_2_1_23_1","unstructured":"Jaya Kawale , Hung H Bui , Branislav Kveton , Long Tran-Thanh , and Sanjay Chawla . 2015. Efficient Thompson Sampling for Online Matrix Factorization Recommendation . In Advances in Neural Information Processing Systems 28. Curran Associates , Inc ., 1297--1305. Jaya Kawale, Hung H Bui, Branislav Kveton, Long Tran-Thanh, and Sanjay Chawla. 2015. Efficient Thompson Sampling for Online Matrix Factorization Recommendation. In Advances in Neural Information Processing Systems 28. Curran Associates, Inc., 1297--1305."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5178-7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2892753.2892818"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1621995.1622013"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 32Nd International Conference on International Conference on Machine Learning -","volume":"37","author":"Kveton Branislav","year":"2015","unstructured":"Branislav Kveton , Csaba Szepesv\u00e1ri , Zheng Wen , and Azin Ashkan . 2015 . Cascading Bandits: Learning to Rank in the Cascade Model . In Proceedings of the 32Nd International Conference on International Conference on Machine Learning - Volume 37 (ICML'15). JMLR.org, 767--776. Branislav Kveton, Csaba Szepesv\u00e1ri, Zheng Wen, and Azin Ashkan. 2015. Cascading Bandits: Learning to Rank in the Cascade Model. In Proceedings of the 32Nd International Conference on International Conference on Machine Learning - Volume 37 (ICML'15). JMLR.org, 767--776."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.076"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911548"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Li Shuai","year":"2016","unstructured":"Shuai Li , Baoxiang Wang , Shengyu Zhang , and Wei Chen . 2016 . Contextual Combinatorial Cascading Bandits . In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 1245--1253. Shuai Li, Baoxiang Wang, Shengyu Zhang, and Wei Chen. 2016. Contextual Combinatorial Cascading Bandits. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 1245--1253."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, FLAIRS. 67--72","author":"Lou\u00ebdec Jonathan","year":"2015","unstructured":"Jonathan Lou\u00ebdec , Max Chevalier , Josiane Mothe , Aur\u00e9lien Garivier , and S\u00e9bastien Gerchinovitz . 2015 . A Multiple-Play Bandit Algorithm Applied to Recommender Systems . In Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, FLAIRS. 67--72 . Jonathan Lou\u00ebdec, Max Chevalier, Josiane Mothe, Aur\u00e9lien Garivier, and S\u00e9bastien Gerchinovitz. 2015. A Multiple-Play Bandit Algorithm Applied to Recommender Systems. In Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, FLAIRS. 67--72."},{"key":"e_1_3_2_1_35_1","volume-title":"Bandits Warm-up Cold Recommender Systems. CoRR abs\/1407.2806 (June","author":"Mary J\u00e9r\u00e9mie","year":"2014","unstructured":"J\u00e9r\u00e9mie Mary , Romaric Gaudel , and Philippe Preux . 2014. Bandits Warm-up Cold Recommender Systems. CoRR abs\/1407.2806 (June 2014 ). J\u00e9r\u00e9mie Mary, Romaric Gaudel, and Philippe Preux. 2014. Bandits Warm-up Cold Recommender Systems. CoRR abs\/1407.2806 (June 2014)."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics. 442--450","author":"Mellor Joseph","year":"2013","unstructured":"Joseph Mellor and Jonathan Shapiro . 2013 . Thompson Sampling in Switching Environments with Bayesian Online Change Point Detection . In Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics. 442--450 . Joseph Mellor and Jonathan Shapiro. 2013. Thompson Sampling in Switching Environments with Bayesian Online Change Point Detection. In Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics. 442--450."},{"key":"e_1_3_2_1_37_1","unstructured":"Minh-Quan Nguyen. 2014. Multi-armed Bandit Problem and Its Applications in Intelligent Tutoring Systems. Master's thesis. \u00c9cole Polytechnique.  Minh-Quan Nguyen. 2014. Multi-armed Bandit Problem and Its Applications in Intelligent Tutoring Systems. Master's thesis. \u00c9cole Polytechnique."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.183"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390255"},{"key":"e_1_3_2_1_40_1","first-page":"1","article-title":"Contextual Bandits with Similarity Information","volume":"15","author":"Slivkins Aleksandrs","year":"2014","unstructured":"Aleksandrs Slivkins . 2014 . Contextual Bandits with Similarity Information . J. Mach. Learn. Res. 15 , 1 (Jan. 2014), 2533--2568. Aleksandrs Slivkins. 2014. Contextual Bandits with Similarity Information. J. Mach. Learn. Res. 15, 1 (Jan. 2014), 2533--2568.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_41_1","first-page":"1","article-title":"Ranked Bandits in Metric Spaces: Learning Diverse Rankings over Large Document Collections","volume":"14","author":"Slivkins Aleksandrs","year":"2013","unstructured":"Aleksandrs Slivkins , Filip Radlinski , and Sreenivas Gollapudi . 2013 . Ranked Bandits in Metric Spaces: Learning Diverse Rankings over Large Document Collections . J. Mach. Learn. Res. 14 , 1 (Feb. 2013), 399--436. Aleksandrs Slivkins, Filip Radlinski, and Sreenivas Gollapudi. 2013. Ranked Bandits in Metric Spaces: Learning Diverse Rankings over Large Document Collections. J. Mach. Learn. Res. 14, 1 (Feb. 2013), 399--436.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981780.2981977"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645732"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959162"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1893193.1893232"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623372"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133163"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505690"}],"event":{"name":"IUI'18: 23rd International Conference on Intelligent User Interfaces","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Tokyo Japan","acronym":"IUI'18"},"container-title":["23rd International Conference on Intelligent User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3172944.3172967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3172944.3172967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:15:19Z","timestamp":1750281319000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3172944.3172967"}},"subtitle":["an Experimental Study within e-Commerce"],"short-title":[],"issued":{"date-parts":[[2018,3,5]]},"references-count":47,"alternative-id":["10.1145\/3172944.3172967","10.1145\/3172944"],"URL":"https:\/\/doi.org\/10.1145\/3172944.3172967","relation":{},"subject":[],"published":{"date-parts":[[2018,3,5]]},"assertion":[{"value":"2018-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}