{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T22:38:39Z","timestamp":1777675119972,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,18]]},"DOI":"10.1145\/3523227.3546755","type":"proceedings-article","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T14:13:46Z","timestamp":1663078426000},"page":"288-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Bundle MCR: Towards Conversational Bundle Recommendation"],"prefix":"10.1145","author":[{"given":"Zhankui","family":"He","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, UC San Diego, United States and Hal\u0131c\u0131o\u011flu Data Science Institute, UC San Diego, United States"}]},{"given":"Handong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Adobe Research, USA"}]},{"given":"Tong","family":"Yu","sequence":"additional","affiliation":[{"name":"Adobe Research, USA"}]},{"given":"Sungchul","family":"Kim","sequence":"additional","affiliation":[{"name":"Adobe Research, USA"}]},{"given":"Fan","family":"Du","sequence":"additional","affiliation":[{"name":"Adobe Research, USA"}]},{"given":"Julian","family":"McAuley","sequence":"additional","affiliation":[{"name":"UC San Diego, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,9,13]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"397","article-title":"Using Confidence Bounds for Exploitation-Exploration Trade-offs","volume":"3","author":"Auer Peter","year":"2002","unstructured":"Peter Auer. 2002. Using Confidence Bounds for Exploitation-Exploration Trade-offs. J. Mach. Learn. Res. 3(2002), 397\u2013422.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_2_2_1","volume-title":"Personalized Bundle List Recommendation. The World Wide Web Conference(2019)","author":"Bai Jinze","year":"2019","unstructured":"Jinze Bai, Chang Zhou, Junshuai Song, Xiaoru Qu, Weiting An, Zhao Li, and Jun Gao. 2019. Personalized Bundle List Recommendation. The World Wide Web Conference(2019)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401198"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401198"},{"key":"e_1_3_2_2_5_1","unstructured":"Olivier Chapelle and Lihong Li. 2011. An Empirical Evaluation of Thompson Sampling. In NIPS."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Liang Chen Yang Liu Xiangnan He Lianli Gao and Zibin Zheng. 2019. Matching User with Item Set: Collaborative Bundle Recommendation with Deep Attention Network. In IJCAI.","DOI":"10.24963\/ijcai.2019\/290"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Qibin Chen Junyang Lin Yichang Zhang Ming Ding Yukuo Cen Hongxia Yang and Jie Tang. 2019. Towards Knowledge-Based Recommender Dialog System. ArXiv abs\/1908.05391(2019).","DOI":"10.18653\/v1\/D19-1189"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330652"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2004.04.009"},{"key":"e_1_3_2_2_10_1","unstructured":"Kyunghyun Cho Bart van Merrienboer Dzmitry Bahdanau and Yoshua Bengio. 2014. On the Properties of Neural Machine Translation: Encoder\u2013Decoder Approaches. In SSST@EMNLP."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939746"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475440"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412734"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462913"},{"key":"e_1_3_2_2_15_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. ArXiv abs\/1810.04805(2019).","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. ArXiv abs\/1810.04805(2019)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.05.005"},{"key":"e_1_3_2_2_17_1","article-title":"The MovieLens Datasets","volume":"5","author":"Harper Maxwell","year":"2015","unstructured":"F.\u00a0Maxwell Harper and Joseph\u00a0A. Konstan. 2015. The MovieLens Datasets: History and Context. ACM Trans. Interact. Intell. Syst. 5 (2015), 19:1\u201319:19.","journal-title":"History and Context. ACM Trans. Interact. Intell. Syst."},{"key":"e_1_3_2_2_18_1","volume-title":"Neural networks: a comprehensive foundation","author":"Haykin Simon","unstructured":"Simon Haykin. 1994. Neural networks: a comprehensive foundation. Prentice Hall PTR."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482136"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330979"},{"key":"e_1_3_2_2_21_1","unstructured":"D. Jannach and Ahtsham Manzoor. 2020. End-to-End Learning for Conversational Recommendation: A Long Way to Go?. In IntRS@RecSys."},{"key":"e_1_3_2_2_22_1","volume-title":"Communication Game: Self-Supervised Bot-Play for Goal-oriented Dialogue. In EMNLP\/IJCNLP.","author":"Kang Dongyeop","year":"2019","unstructured":"Dongyeop Kang, Anusha Balakrishnan, Pararth Shah, Paul\u00a0A. Crook, Y-Lan Boureau, and J. Weston. 2019. Recommendation as a Communication Game: Self-Supervised Bot-Play for Goal-oriented Dialogue. In EMNLP\/IJCNLP."},{"key":"e_1_3_2_2_23_1","volume-title":"Self-Attentive Sequential Recommendation. 2018 IEEE International Conference on Data Mining (ICDM)","author":"Kang Wang-Cheng","year":"2018","unstructured":"Wang-Cheng Kang and Julian McAuley. 2018. Self-Attentive Sequential Recommendation. 2018 IEEE International Conference on Data Mining (ICDM) (2018), 197\u2013206."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.pan.a004868"},{"key":"e_1_3_2_2_25_1","volume-title":"Kingma and Jimmy Ba","author":"P.","year":"2015","unstructured":"Diederik\u00a0P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. CoRR abs\/1412.6980(2015)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371769"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403258"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Lei Li Yongfeng Zhang and Li Chen. 2021. Personalized Transformer for Explainable Recommendation. In ACL\/IJCNLP.","DOI":"10.18653\/v1\/2021.acl-long.383"},{"key":"e_1_3_2_2_29_1","unstructured":"Raymond Li S. Kahou Hannes Schulz Vincent Michalski Laurent Charlin and C. Pal. 2018. Towards Deep Conversational Recommendations. ArXiv abs\/1812.07617(2018)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401240"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01585758"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767755"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_2_34_1","unstructured":"Vinod Nair and Geoffrey\u00a0E. Hinton. 2010. Rectified Linear Units Improve Restricted Boltzmann Machines. In ICML."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080724"},{"key":"e_1_3_2_2_36_1","volume-title":"Factorization Machines. 2010 IEEE International Conference on Data Mining","author":"Rendle Steffen","year":"2010","unstructured":"Steffen Rendle. 2010. Factorization Machines. 2010 IEEE International Conference on Data Mining (2010), 995\u20131000."},{"key":"e_1_3_2_2_37_1","volume-title":"BPR: Bayesian Personalized Ranking from Implicit Feedback. In UAI.","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian Personalized Ranking from Implicit Feedback. In UAI."},{"key":"e_1_3_2_2_38_1","unstructured":"John Schulman Filip Wolski Prafulla Dhariwal Alec Radford and Oleg Klimov. 2017. Proximal Policy Optimization Algorithms. ArXiv abs\/1707.06347(2017)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357895"},{"key":"e_1_3_2_2_40_1","volume-title":"Conversational Recommender System. The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval","author":"Sun Yueming","year":"2018","unstructured":"Yueming Sun and Yi Zhang. 2018. Conversational Recommender System. The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval (2018)."},{"key":"e_1_3_2_2_41_1","unstructured":"Ilya Sutskever Oriol Vinyals and Quoc\u00a0V. Le. 2014. Sequence to Sequence Learning with Neural Networks. In NIPS."},{"key":"e_1_3_2_2_42_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_2_43_1","volume-title":"Advances in Neural Information Processing Systems, I.\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett (Eds.). Vol.\u00a030. Curran Associates","author":"Vaswani Ashish","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141\u00a0ukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems, I.\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett (Eds.). Vol.\u00a030. Curran Associates, Inc."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450133"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209219.3209228"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467211"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"M. Xie L. Lakshmanan and P. Wood. 2010. Breaking out of the box of recommendations: from items to packages. In RecSys \u201910.","DOI":"10.1145\/1864708.1864739"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462920"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMASSC.2010.037653"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.39"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380148"},{"key":"e_1_3_2_2_52_1","volume-title":"User Respond. Proceedings of the 27th ACM International Conference on Information and Knowledge Management","author":"Zhang Yongfeng","year":"2018","unstructured":"Yongfeng Zhang, X. Chen, Qingyao Ai, Liu Yang, and W. Croft. 2018. Towards Conversational Search and Recommendation: System Ask, User Respond. Proceedings of the 27th ACM International Conference on Information and Knowledge Management (2018)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512088"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609603"}],"event":{"name":"RecSys '22: Sixteenth ACM Conference on Recommender Systems","location":"Seattle WA USA","acronym":"RecSys '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 16th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3523227.3546755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3523227.3546755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:44Z","timestamp":1750188644000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3523227.3546755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,13]]},"references-count":54,"alternative-id":["10.1145\/3523227.3546755","10.1145\/3523227"],"URL":"https:\/\/doi.org\/10.1145\/3523227.3546755","relation":{},"subject":[],"published":{"date-parts":[[2022,9,13]]},"assertion":[{"value":"2022-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}