{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T04:57:09Z","timestamp":1763182629430,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3412736","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T06:18:51Z","timestamp":1603088331000},"page":"2661-2668","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Personalizing Natural Language Understanding using Multi-armed Bandits and Implicit Feedback"],"prefix":"10.1145","author":[{"given":"Fabian","family":"Moerchen","sequence":"first","affiliation":[{"name":"Amazon Music, Seattle, WA, USA"}]},{"given":"Patrick","family":"Ernst","sequence":"additional","affiliation":[{"name":"Amazon Music, Berlin, Germany"}]},{"given":"Giovanni","family":"Zappella","sequence":"additional","affiliation":[{"name":"Amazon Music, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1214\/17-EJS1341SI"},{"key":"e_1_3_2_2_2_1","volume-title":"Advances in Neural Information Processing Systems 28 (NIPS","author":"Agarwal Aman","year":"2015","unstructured":"Aman Agarwal , Kenta Takatsu , Ivan Zaitsev , and Thorsten Joachims . 2015. A General Framework for Counterfactual Learning-to-Rank . In Advances in Neural Information Processing Systems 28 (NIPS 2015 ). Aman Agarwal, Kenta Takatsu, Ivan Zaitsev, and Thorsten Joachims. 2015. A General Framework for Counterfactual Learning-to-Rank. In Advances in Neural Information Processing Systems 28 (NIPS 2015)."},{"key":"e_1_3_2_2_3_1","volume-title":"International Conference on Learning Theory.","author":"Agrawal Shipra","year":"2012","unstructured":"Shipra Agrawal and Navin Goyal . 2012 . Analysis of Thompson Sampling for the multi-armed bandit problem . In International Conference on Learning Theory. Shipra Agrawal and Navin Goyal. 2012. Analysis of Thompson Sampling for the multi-armed bandit problem. In International Conference on Learning Theory."},{"key":"e_1_3_2_2_4_1","volume-title":"International Conference on Machine Learning. 127--135","author":"Agrawal Shipra","year":"2013","unstructured":"Shipra Agrawal and Navin Goyal . 2013 . Thompson sampling for contextual bandits with linear payoffs . In International Conference on Machine Learning. 127--135 . Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In International Conference on Machine Learning. 127--135."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037661.2037667"},{"volume-title":"Overview of the TREC 2011 Entity Track. In TREC. NIST Special Publication.","author":"Balog Krisztian","key":"e_1_3_2_2_6_1","unstructured":"Krisztian Balog , Pavel Serdyukov , and Arjen P . de Vries. 2011b . Overview of the TREC 2011 Entity Track. In TREC. NIST Special Publication. Krisztian Balog, Pavel Serdyukov, and Arjen P. de Vries. 2011b. Overview of the TREC 2011 Entity Track. In TREC. NIST Special Publication."},{"key":"e_1_3_2_2_7_1","volume-title":"et almbox","author":"Bubeck S\u00e9bastien","year":"2012","unstructured":"S\u00e9bastien Bubeck , Nicolo Cesa-Bianchi , et almbox . 2012 . Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Foundations and Trends\u00ae in Machine Learning , Vol. 5 , 1 (2012), 1--122. S\u00e9bastien Bubeck, Nicolo Cesa-Bianchi, et almbox. 2012. Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Foundations and Trends\u00ae in Machine Learning, Vol. 5, 1 (2012), 1--122."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 40th Annual Meeting on Association for Computational Linguistics","author":"Collins Michael","year":"2002","unstructured":"Michael Collins . 2002 . Ranking Algorithms for Named-entity Extraction: Boosting and the Voted Perceptron . In Proceedings of the 40th Annual Meeting on Association for Computational Linguistics ( Philadelphia, Pennsylvania) (ACL '02). Association for Computational Linguistics, Stroudsburg, PA, USA, 489--496. Michael Collins. 2002. Ranking Algorithms for Named-entity Extraction: Boosting and the Voted Perceptron. In Proceedings of the 40th Annual Meeting on Association for Computational Linguistics (Philadelphia, Pennsylvania) (ACL '02). Association for Computational Linguistics, Stroudsburg, PA, USA, 489--496."},{"key":"e_1_3_2_2_9_1","article-title":"SMAPH: A Piggyback Approach for Entity-Linking in Web Queries","volume":"37","author":"Cornolti Marco","year":"2018","unstructured":"Marco Cornolti , Paolo Ferragina , Massimiliano Ciaramita , Stefan Rued , and Hinrich Schuetze . 2018 . SMAPH: A Piggyback Approach for Entity-Linking in Web Queries . ACM Trans. Inf. Syst. , Vol. 37 , 1, Article 13 (2018), 42 pages. Marco Cornolti, Paolo Ferragina, Massimiliano Ciaramita, Stefan Rued, and Hinrich Schuetze. 2018. SMAPH: A Piggyback Approach for Entity-Linking in Web Queries. ACM Trans. Inf. Syst., Vol. 37, 1, Article 13 (2018), 42 pages.","journal-title":"ACM Trans. Inf. Syst."},{"key":"e_1_3_2_2_10_1","volume-title":"de Vries","author":"Demartini Gianluca","year":"2010","unstructured":"Gianluca Demartini , Tereza Iofciu , and Arjen P . de Vries . 2010 . Overview of the INEX 2009 Entity Ranking Track. In Focused Retrieval and Evaluation,, Shlomo Geva, Jaap Kamps, and Andrew Trotman (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 254--264. Gianluca Demartini, Tereza Iofciu, and Arjen P. de Vries. 2010. Overview of the INEX 2009 Entity Ranking Track. In Focused Retrieval and Evaluation,, Shlomo Geva, Jaap Kamps, and Andrew Trotman (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 254--264."},{"volume-title":"22nd International Conference on Machine Learning.","author":"Chris","key":"e_1_3_2_2_11_1","unstructured":"Chris Burges et al. 2005. Learning to Rank using Gradient Descent . In 22nd International Conference on Machine Learning. Chris Burges et al. 2005. Learning to Rank using Gradient Descent. In 22nd International Conference on Machine Learning."},{"key":"e_1_3_2_2_12_1","volume-title":"Identifying and exploiting target entity type information for ad hoc entity retrieval. Information Retrieval Journal (05","author":"Garigliotti Dario","year":"2018","unstructured":"Dario Garigliotti , Faegheh Hasibi , and Krisztian Balog . 2018. Identifying and exploiting target entity type information for ad hoc entity retrieval. Information Retrieval Journal (05 Dec 2018 ). Dario Garigliotti, Faegheh Hasibi, and Krisztian Balog. 2018. Identifying and exploiting target entity type information for ad hoc entity retrieval. Information Retrieval Journal (05 Dec 2018)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970398.2970406"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695748"},{"key":"e_1_3_2_2_15_1","unstructured":"Thorsten Joachims Adith Swaminathan and Maarten de Rijke. 2018. Deep learning with logged bandit feedback. (2018).  Thorsten Joachims Adith Swaminathan and Maarten de Rijke. 2018. Deep learning with logged bandit feedback. (2018)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871451"},{"key":"e_1_3_2_2_17_1","volume-title":"18th International Conf. on Machine Learning.","author":"Lafferty John","year":"2001","unstructured":"John Lafferty , Andrew McCallum , and Fernando CN Pereira . 2001 . Conditional random fields: Probabilistic models for segmenting and labeling sequence data . In 18th International Conf. on Machine Learning. John Lafferty, Andrew McCallum, and Fernando CN Pereira. 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In 18th International Conf. on Machine Learning."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1030"},{"key":"e_1_3_2_2_19_1","unstructured":"Tor Lattimore and Csaba Szepesv\u00e1ri. 2018. Bandit algorithms. (2018). https:\/\/tor-lattimore.com\/downloads\/book\/book.pdf  Tor Lattimore and Csaba Szepesv\u00e1ri. 2018. Bandit algorithms. (2018). https:\/\/tor-lattimore.com\/downloads\/book\/book.pdf"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1944566.1944670"},{"key":"e_1_3_2_2_21_1","volume-title":"Deep Bayesian Bandits Showdown: An Empirical Comparison of Bayesian Deep Networks for Thompson Sampling. In ICLR","author":"Riquelme Carlos","year":"2018","unstructured":"Carlos Riquelme , George Tucker , and Jasper Snoek . 2018 . Deep Bayesian Bandits Showdown: An Empirical Comparison of Bayesian Deep Networks for Thompson Sampling. In ICLR 2018. Carlos Riquelme, George Tucker, and Jasper Snoek. 2018. Deep Bayesian Bandits Showdown: An Empirical Comparison of Bayesian Deep Networks for Thompson Sampling. In ICLR 2018."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488484"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505601"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1152"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SLT.2018.8639519"},{"key":"e_1_3_2_2_26_1","volume-title":"Advances in Neural Information Processing Systems 28 (NIPS","author":"Swaminathan Adith","year":"2015","unstructured":"Adith Swaminathan and Thorsten Joachims . 2015. The Self-Normalized Estimator for Counterfactual Learning . In Advances in Neural Information Processing Systems 28 (NIPS 2015 ). Adith Swaminathan and Thorsten Joachims. 2015. The Self-Normalized Estimator for Counterfactual Learning. In Advances in Neural Information Processing Systems 28 (NIPS 2015)."},{"volume-title":"IEEE 13th Conference on Semantic Computing (ICSC). 16--23","author":"Torres-Tram\u00f3n P.","key":"e_1_3_2_2_27_1","unstructured":"P. Torres-Tram\u00f3n , M. Timilsina , and C. Hayes . 2019. A Diffusion-Based Method for Entity Search . In IEEE 13th Conference on Semantic Computing (ICSC). 16--23 . P. Torres-Tram\u00f3n, M. Timilsina, and C. Hayes. 2019. A Diffusion-Based Method for Entity Search. In IEEE 13th Conference on Semantic Computing (ICSC). 16--23."},{"key":"e_1_3_2_2_28_1","volume-title":"COLING","author":"Yadav Vikas","year":"2018","unstructured":"Vikas Yadav and Steven Bethard . 2018 . A Survey on Recent Advances in Named Entity Recognition from Deep Learning models . In COLING 2018. Vikas Yadav and Steven Bethard. 2018. A Survey on Recent Advances in Named Entity Recognition from Deep Learning models. In COLING 2018."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.26615\/978-954-452-049-6_101"}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Ireland","acronym":"CIKM '20"},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412736","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:55Z","timestamp":1750197775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":29,"alternative-id":["10.1145\/3340531.3412736","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3412736","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}