{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:35Z","timestamp":1772164115236,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T00:00:00Z","timestamp":1528761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute for Information & communications Technology Promotion","award":["2016-0-00160"],"award-info":[{"award-number":["2016-0-00160"]}]},{"name":"ICT R&D program of MSIP\/IITP","award":["2016-0-00563"],"award-info":[{"award-number":["2016-0-00563"]}]},{"name":"ERC consolidator grant","award":["308267"],"award-info":[{"award-number":["308267"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,12]]},"DOI":"10.1145\/3219617.3219639","type":"proceedings-article","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T14:21:21Z","timestamp":1528899681000},"page":"53-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-armed Bandit with Additional Observations"],"prefix":"10.1145","author":[{"given":"Donggyu","family":"Yun","sequence":"first","affiliation":[{"name":"Naver Corporation, Seongnam-si, Rebublic of Korea"}]},{"given":"Sumyeong","family":"Ahn","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Rebublic of Korea"}]},{"given":"Alexandre","family":"Proutiere","sequence":"additional","affiliation":[{"name":"KTH - Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Jinwoo","family":"Shin","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Rebublic of Korea"}]},{"given":"Yung","family":"Yi","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Rebublic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of AAAI.","author":"Amin Kareem","year":"2015","unstructured":"Kareem Amin , Satyen Kale , and Gerald Tesauro Deepak Turaga . 2015 . Budgeted Prediction With Expert Advice . In Proceedings of AAAI. Kareem Amin, Satyen Kale, and Gerald Tesauro Deepak Turaga. 2015. Budgeted Prediction With Expert Advice. In Proceedings of AAAI."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953023"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"e_1_3_2_1_4_1","volume-title":"Leveraging Side Observations in Stochastic Bandits Proceedings of UAI.","author":"Caron St\u00e9phane","year":"2012","unstructured":"St\u00e9phane Caron , Branislav Kveton , Marc Lelarge , and Smriti Bhagat . 2012 . Leveraging Side Observations in Stochastic Bandits Proceedings of UAI. St\u00e9phane Caron, Branislav Kveton, Marc Lelarge, and Smriti Bhagat. 2012. Leveraging Side Observations in Stochastic Bandits Proceedings of UAI."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/258128.258179"},{"key":"e_1_3_2_1_6_1","volume-title":"Prediction, Learning, and Games","author":"Cesa-Bianchi Nicol\u00f2","unstructured":"Nicol\u00f2 Cesa-Bianchi and G\u00e1bor Lugosi . 2006. Prediction, Learning, and Games . Cambridge University Press . Nicol\u00f2 Cesa-Bianchi and G\u00e1bor Lugosi. 2006. Prediction, Learning, and Games. Cambridge University Press."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745844.2745847"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848225"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_3_2_1_10_1","unstructured":"A. Garivier and O. Capp\u00e9. 2011. The KL-UCB algorithm for bounded stochastic bandits and beyond Proceedings of COLT.  A. Garivier and O. Capp\u00e9. 2011. The KL-UCB algorithm for bounded stochastic bandits and beyond Proceedings of COLT."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2004.10.016"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of COLT.","author":"Kale Satyen","year":"2014","unstructured":"Satyen Kale . 2014 . Multiarmed bandits with limited expert advice . In Proceedings of COLT. Satyen Kale. 2014. Multiarmed bandits with limited expert advice. In Proceedings of COLT."},{"key":"e_1_3_2_1_13_1","volume-title":"On Bayesian upper confidence bounds for bandit problems Proceedings of AISTATS","author":"Kaufmann Emilie","unstructured":"Emilie Kaufmann , Olivier Capp\u00e9 , and Aur\u00e9lien Garivier . 2012. On Bayesian upper confidence bounds for bandit problems Proceedings of AISTATS . Emilie Kaufmann, Olivier Capp\u00e9, and Aur\u00e9lien Garivier. 2012. On Bayesian upper confidence bounds for bandit problems Proceedings of AISTATS."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"e_1_3_2_1_16_1","volume-title":"Prediction with Limited Advice and Multiarmed Bandits with Paid Observations Proceedings of ICML.","author":"Seldin Yevgeny","year":"2014","unstructured":"Yevgeny Seldin , Peter Bartlett , Koby Crammer , and Yasin Abbasi-Yadkori . 2014 . Prediction with Limited Advice and Multiarmed Bandits with Paid Observations Proceedings of ICML. Yevgeny Seldin, Peter Bartlett, Koby Crammer, and Yasin Abbasi-Yadkori. 2014. Prediction with Limited Advice and Multiarmed Bandits with Paid Observations Proceedings of ICML."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2502595"},{"key":"e_1_3_2_1_18_1","volume-title":"Estimation Bias in Multi-Armed Bandit Algorithms for Search Advertising Proceedings of NIPS.","author":"Xu Min","year":"2013","unstructured":"Min Xu , Tao Qin , and Tie-Yan Liu . 2013 . Estimation Bias in Multi-Armed Bandit Algorithms for Search Advertising Proceedings of NIPS. Min Xu, Tao Qin, and Tie-Yan Liu. 2013. Estimation Bias in Multi-Armed Bandit Algorithms for Search Advertising Proceedings of NIPS."}],"event":{"name":"SIGMETRICS '18: ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems","location":"Irvine CA USA","acronym":"SIGMETRICS '18","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219617.3219639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219617.3219639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:39:17Z","timestamp":1750196357000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219617.3219639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,12]]},"references-count":18,"alternative-id":["10.1145\/3219617.3219639","10.1145\/3219617"],"URL":"https:\/\/doi.org\/10.1145\/3219617.3219639","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3292040.3219639","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2018,6,12]]},"assertion":[{"value":"2018-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}