{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:00:24Z","timestamp":1761930024830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330852","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"696-704","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Focused Context Balancing for Robust Offline Policy Evaluation"],"prefix":"10.1145","author":[{"given":"Hao","family":"Zou","sequence":"first","affiliation":[{"name":"Tsinghua University &amp; Beijing National Research Center for Information Science and Technology (BNRist)., Beijing, China"}]},{"given":"Kun","family":"Kuang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Boqi","family":"Chen","sequence":"additional","affiliation":[{"name":"Boston University &amp; Tsinghua University, Boston, MA, USA"}]},{"given":"Peixuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Tencent, Shenzhen, China"}]},{"given":"Peng","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098155"},{"volume-title":"International Conference on Machine Learning. 1638--1646","year":"2014","author":"Agarwal Alekh","key":"e_1_3_2_1_2_1"},{"volume-title":"Approximate residual balancing: debiased inference of average treatment effects in high dimensions. Journal of the Royal Statistical Society: Series B (Statistical Methodology)","year":"2016","author":"Athey Susan","key":"e_1_3_2_1_3_1"},{"volume-title":"An introduction to propensity score methods for reducing the effects of confounding in observational studies. Multivariate behavioral research","year":"2011","author":"Austin Peter C","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1541-0420.2005.00377.x"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2567766"},{"volume-title":"International Conference on International Conference on Machine Learning. 1097--1104","year":"2011","author":"Dudik Miroslav","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2015.06.017"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpr025"},{"volume-title":"Monte carlo methods","author":"Hammersley John","key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-009-5819-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483446"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964905"},{"volume-title":"A note on importance sampling using standardized weights","year":"1992","author":"Kong Augustine","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098032"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298239.3298261"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0124"},{"key":"e_1_3_2_1_18_1","unstructured":"John Langford and Tong Zhang. 2008. The epoch-greedy algorithm for multi-armed bandits with side information. In Advances in neural information processing systems. 817--824.   John Langford and Tong Zhang. 2008. The epoch-greedy algorithm for multi-armed bandits with side information. In Advances in neural information processing systems. 817--824."},{"volume-title":"Retail advertising works! measuring the effects of advertising on sales via a controlled experiment on yahoo!","year":"2009","author":"Lewis Randall","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742562"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"volume-title":"Monte Carlo theory, methods and examples. Monte Carlo Theory, Methods and Examples. Art Owen","year":"2013","author":"Owen Art B","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/imamat\/2.3.228"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/70.1.41"},{"volume-title":"Simulation and the Monte Carlo method","author":"Rubinstein Reuven Y","key":"e_1_3_2_1_25_1"},{"volume-title":"Recommendations as treatments: Debiasing learning and evaluation. arXiv preprint arXiv:1602.05352","year":"2016","author":"Schnabel Tobias","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"Alex Strehl John Langford Lihong Li and Sham M Kakade. 2010. Learning from logged implicit exploration data. In Advances in Neural Information Processing Systems. 2217--2225.   Alex Strehl John Langford Lihong Li and Sham M Kakade. 2010. Learning from logged implicit exploration data. In Advances in Neural Information Processing Systems. 2217--2225."},{"volume-title":"International Conference on Machine Learning. 814--823","year":"2015","author":"Swaminathan Adith","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Adith Swaminathan and Thorsten Joachims. 2015b. The self-normalized estimator for counterfactual learning. In Advances in Neural Information Processing Systems. 3231--3239.   Adith Swaminathan and Thorsten Joachims. 2015b. The self-normalized estimator for counterfactual learning. In Advances in Neural Information Processing Systems. 3231--3239."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2009.11.020"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2015.1023805"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Anchorage AK USA","acronym":"KDD '19"},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330852","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:02Z","timestamp":1750206362000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":30,"alternative-id":["10.1145\/3292500.3330852","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330852","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}