{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:37Z","timestamp":1750221037398,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,27]],"date-time":"2018-09-27T00:00:00Z","timestamp":1538006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,27]]},"DOI":"10.1145\/3240323.3240344","type":"proceedings-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T18:00:41Z","timestamp":1538157641000},"page":"122-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Interactive recommendation via deep neural memory augmented contextual bandits"],"prefix":"10.1145","author":[{"given":"Yilin","family":"Shen","sequence":"first","affiliation":[{"name":"Samsung Research America"}]},{"given":"Yue","family":"Deng","sequence":"additional","affiliation":[{"name":"Samsung Research America"}]},{"given":"Avik","family":"Ray","sequence":"additional","affiliation":[{"name":"Samsung Research America"}]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[{"name":"Samsung Research America"}]}],"member":"320","published-online":{"date-parts":[[2018,9,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Schapire","author":"Agarwal Alekh","year":"2014","unstructured":"Alekh Agarwal , Daniel Hsu , Satyen Kale , John Langford , Lihong Li , and Robert E . Schapire . 2014 . Taming the Monster : A Fast and Simple Algorithm for Contextual Bandits (ICML'14). II- 1638--II-1646. Alekh Agarwal, Daniel Hsu, Satyen Kale, John Langford, Lihong Li, and Robert E. Schapire. 2014. Taming the Monster: A Fast and Simple Algorithm for Contextual Bandits (ICML'14). II-1638--II-1646."},{"key":"e_1_3_2_2_2_1","unstructured":"Shipra Agrawal and Navin Goyal. 2013. Thompson Sampling for Contextual Bandits with Linear Payoffs (ICML'13). 127--135.   Shipra Agrawal and Navin Goyal. 2013. Thompson Sampling for Contextual Bandits with Linear Payoffs (ICML'13). 127--135."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Robin Allesiardo Raphael F\u00e9raud and Djallel Bouneffouf. 2014. A Neural Networks Committee for the Contextual Bandit Problem (NIPS'14). 374--381.  Robin Allesiardo Raphael F\u00e9raud and Djallel Bouneffouf. 2014. A Neural Networks Committee for the Contextual Bandit Problem (NIPS'14). 374--381.","DOI":"10.1007\/978-3-319-12637-1_47"},{"key":"e_1_3_2_2_4_1","unstructured":"Nicol\u00f2 Cesa-Bianchi Claudio Gentile and Giovanni Zappella. 2013. A Gang of Bandits (NIPS'13). 737--745.   Nicol\u00f2 Cesa-Bianchi Claudio Gentile and Giovanni Zappella. 2013. A Gang of Bandits (NIPS'13). 737--745."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939746"},{"key":"e_1_3_2_2_6_1","unstructured":"Wei Chu Lihong Li Lev Reyzin and Robert Schapire. 2011. Contextual Bandits with Linear Payoff Functions (AISTATS'11). 208--214.  Wei Chu Lihong Li Lev Reyzin and Robert Schapire. 2011. Contextual Bandits with Linear Payoff Functions (AISTATS'11). 208--214."},{"key":"e_1_3_2_2_7_1","unstructured":"Miroslav Dudik Daniel Hsu Satyen Kale Nikos Karampatziakis John Langford Lev Reyzin and Tong Zhang. 2011. Efficient Optimal Learning for Contextual Bandits (UAI'11). 169--178.   Miroslav Dudik Daniel Hsu Satyen Kale Nikos Karampatziakis John Langford Lev Reyzin and Tong Zhang. 2011. Efficient Optimal Learning for Contextual Bandits (UAI'11). 169--178."},{"key":"e_1_3_2_2_8_1","unstructured":"Rapha\u00ebl F\u00e9raud Robin Allesiardo Tanguy Urvoy and Fabrice Cl\u00e9rot. 2016. Random Forest for the Contextual Bandit Problem (AISTATS'16). 93--101.  Rapha\u00ebl F\u00e9raud Robin Allesiardo Tanguy Urvoy and Fabrice Cl\u00e9rot. 2016. Random Forest for the Contextual Bandit Problem (AISTATS'16). 93--101."},{"key":"e_1_3_2_2_9_1","volume-title":"Online Clustering of Bandits (ICML '14)","author":"Gentile Claudio","year":"2014","unstructured":"Claudio Gentile , Shuai Li , and Giovanni Zappella . 2014 . Online Clustering of Bandits (ICML '14) . 757--765. Claudio Gentile, Shuai Li, and Giovanni Zappella. 2014. Online Clustering of Bandits (ICML '14). 757--765."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"e_1_3_2_2_11_1","volume-title":"Neural Turing Machines. CoRR abs\/1410.5401","author":"Graves Alex","year":"2014","unstructured":"Alex Graves , Greg Wayne , and Ivo Danihelka . 2014. Neural Turing Machines. CoRR abs\/1410.5401 ( 2014 ). Alex Graves, Greg Wayne, and Ivo Danihelka. 2014. Neural Turing Machines. CoRR abs\/1410.5401 (2014)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609633"},{"key":"e_1_3_2_2_13_1","unstructured":"Jaya Kawale Hung H Bui Branislav Kveton Long Tran-Thanh and Sanjay Chawla. 2015. Efficient Thompson Sampling for Online Matrix-Factorization Recommendation (NIPS'15). 1297--1305.   Jaya Kawale Hung H Bui Branislav Kveton Long Tran-Thanh and Sanjay Chawla. 2015. Efficient Thompson Sampling for Online Matrix-Factorization Recommendation (NIPS'15). 1297--1305."},{"key":"e_1_3_2_2_14_1","volume-title":"Ong","author":"Krause Andreas","year":"2011","unstructured":"Andreas Krause and Cheng S . Ong . 2011 . Contextual Gaussian Process Bandit Optimization (NIPS '11). 2447--2455. Andreas Krause and Cheng S. Ong. 2011. Contextual Gaussian Process Bandit Optimization (NIPS'11). 2447--2455."},{"key":"e_1_3_2_2_15_1","unstructured":"John Langford and Tong Zhang. 2008. The Epoch-Greedy Algorithm for Multi-armed Bandits with Side Information (NIPS'08). 817--824.   John Langford and Tong Zhang. 2008. The Epoch-Greedy Algorithm for Multi-armed Bandits with Side Information (NIPS'08). 817--824."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911548"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the Sixth Asian Conference on Machine Learning (ACML'14)","author":"Nakamura Atsuyoshi","year":"2015","unstructured":"Atsuyoshi Nakamura . 2015 . A UCB-Like Strategy of Collaborative Filtering . In Proceedings of the Sixth Asian Conference on Machine Learning (ACML'14) . 315--329. Atsuyoshi Nakamura. 2015. A UCB-Like Strategy of Collaborative Filtering. In Proceedings of the Sixth Asian Conference on Machine Learning (ACML'14). 315--329."},{"key":"e_1_3_2_2_20_1","volume-title":"Lillicrap","author":"Santoro Adam","year":"2016","unstructured":"Adam Santoro , Sergey Bartunov , Matthew Botvinick , Daan Wierstra , and Timothy P . Lillicrap . 2016 . One-shot Learning with Memory-Augmented Neural Networks. CoRR abs\/1605.06065 (2016). Adam Santoro, Sergey Bartunov, Matthew Botvinick, Daan Wierstra, and Timothy P. Lillicrap. 2016. One-shot Learning with Memory-Augmented Neural Networks. CoRR abs\/1605.06065 (2016)."},{"key":"e_1_3_2_2_21_1","volume-title":"Latent Contextual Bandits: A Non-Negative Matrix Factorization Approach. CoRR abs\/1606.00119","author":"Sen Rajat","year":"2016","unstructured":"Rajat Sen , Karthikeyan Shanmugam , Murat Kocaoglu , Alexandros G. Dimakis , and Sanjay Shakkottai . 2016. Latent Contextual Bandits: A Non-Negative Matrix Factorization Approach. CoRR abs\/1606.00119 ( 2016 ). Rajat Sen, Karthikeyan Shanmugam, Murat Kocaoglu, Alexandros G. Dimakis, and Sanjay Shakkottai. 2016. Latent Contextual Bandits: A Non-Negative Matrix Factorization Approach. CoRR abs\/1606.00119 (2016)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978316"},{"key":"e_1_3_2_2_23_1","volume-title":"Seeger","author":"Srinivas Niranjan","year":"2010","unstructured":"Niranjan Srinivas , Andreas Krause , Sham Kakade , and Matthias W . Seeger . 2010 . Gaussian Process Optimization in the Bandit Setting : No Regret and Experimental Design (ICML '10). 1015--1022. Niranjan Srinivas, Andreas Krause, Sham Kakade, and Matthias W. Seeger. 2010. Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design (ICML'10). 1015--1022."},{"key":"e_1_3_2_2_24_1","unstructured":"Michal Valko Nathan Korda R\u00e9mi Munos Ilias Flaounas and Nello Cristianini. 2013. Finite-time Analysis of Kernelised Contextual Bandits (UAI'13). 654--663.   Michal Valko Nathan Korda R\u00e9mi Munos Ilias Flaounas and Nello Cristianini. 2013. Finite-time Analysis of Kernelised Contextual Bandits (UAI'13). 654--663."},{"key":"e_1_3_2_2_25_1","unstructured":"Oriol Vinyals Charles Blundell Tim Lillicrap Koray Kavukcuoglu and Daan Wierstra. 2016. Matching Networks for One Shot Learning (NIPS'16). 3630--3638.   Oriol Vinyals Charles Blundell Tim Lillicrap Koray Kavukcuoglu and Daan Wierstra. 2016. Matching Networks for One Shot Learning (NIPS'16). 3630--3638."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983847"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911528"},{"key":"e_1_3_2_2_28_1","unstructured":"Li Zhou and Emma Brunskill. 2016. Latent Contextual Bandits and Their Application to Personalized Recommendations for New Users (IJCAI'16). 3646--3653.   Li Zhou and Emma Brunskill. 2016. Latent Contextual Bandits and Their Application to Personalized Recommendations for New Users (IJCAI'16). 3646--3653."}],"event":{"name":"RecSys '18: Twelfth ACM Conference on Recommender Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Vancouver British Columbia Canada","acronym":"RecSys '18"},"container-title":["Proceedings of the 12th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240323.3240344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240323.3240344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:42Z","timestamp":1750207422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240323.3240344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,27]]},"references-count":28,"alternative-id":["10.1145\/3240323.3240344","10.1145\/3240323"],"URL":"https:\/\/doi.org\/10.1145\/3240323.3240344","relation":{},"subject":[],"published":{"date-parts":[[2018,9,27]]},"assertion":[{"value":"2018-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}