{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:19Z","timestamp":1750220179453,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Agence Nationale de Recherche","award":["ANR-19-PI3A-0004"],"award-info":[{"award-number":["ANR-19-PI3A-0004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3533078","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["When learning becomes impossible"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Asher","sequence":"first","affiliation":[{"name":"Institut de Recherche en Informatique de Toulouse, Centre Nationale de Recherche Scientifique, France"}]},{"given":"Julie","family":"Hunter","sequence":"additional","affiliation":[{"name":"LINAGORA Labs, France"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/19462166.2014.881417"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3463952.3464121"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10849-018-9271-9"},{"key":"e_1_3_2_1_4_1","volume-title":"Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3","author":"Auer Peter","year":"2002","unstructured":"Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3 (2002), 235\u2013256."},{"key":"e_1_3_2_1_5_1","volume-title":"Switching costs and the Gittins index. Econometrica: Journal of the Econometric Society","author":"Banks S","year":"1994","unstructured":"Jeffrey\u00a0S Banks and Rangarajan\u00a0K Sundaram. 1994. Switching costs and the Gittins index. Econometrica: Journal of the Econometric Society (1994), 687\u2013694."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.22.1.222"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/monist\/onv034"},{"volume-title":"Trust theory: A socio-cognitive and computational model. Vol.\u00a018","author":"Castelfranchi Christiano","key":"e_1_3_2_1_8_1","unstructured":"Christiano Castelfranchi and Rino Falcone. 2010. Trust theory: A socio-cognitive and computational model. Vol.\u00a018. John Wiley & Sons."},{"volume-title":"Prediction, learning, and games","author":"Cesa-Bianchi Nicolo","key":"e_1_3_2_1_9_1","unstructured":"Nicolo Cesa-Bianchi and G\u00e1bor Lugosi. 2006. Prediction, learning, and games. Cambridge university press."},{"key":"e_1_3_2_1_10_1","volume-title":"Confirmation Bias as a Social Skill. Personality and Social Psychology Bulletin 21.11","author":"Dardenne Benoit","year":"1995","unstructured":"Benoit Dardenne and Jacques-Philippe Leyens. 1995. Confirmation Bias as a Social Skill. Personality and Social Psychology Bulletin 21.11 (1995), 1229\u20131239."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-012-0115-x"},{"key":"e_1_3_2_1_12_1","volume-title":"On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial intelligence 77, 2","author":"Dung Phan\u00a0Minh","year":"1995","unstructured":"Phan\u00a0Minh Dung. 1995. On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial intelligence 77, 2 (1995), 321\u2013357."},{"key":"e_1_3_2_1_13_1","unstructured":"Aur\u00e9lien Garivier and Olivier Capp\u00e9. 2011. The KL-UCB Algorithm for Bounded Stochastic Bandits and Beyond.. In COLT. 359\u2013376."},{"volume-title":"Bayesian data analysis","author":"Gelman Andrew","key":"e_1_3_2_1_14_1","unstructured":"Andrew Gelman, John\u00a0B Carlin, Hal\u00a0S Stern, David\u00a0B Dunson, Aki Vehtari, and Donald\u00a0B Rubin. 2013. Bayesian data analysis. CRC press."},{"volume-title":"Patterns of discovery: An inquiry into the conceptual foundations of science. Vol.\u00a0251","author":"Hanson Norwood\u00a0Russell","key":"e_1_3_2_1_15_1","unstructured":"Norwood\u00a0Russell Hanson. 1958. Patterns of discovery: An inquiry into the conceptual foundations of science. Vol.\u00a0251. Cambridge University Press."},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Non-doxastic conspiracy theories","volume":"2020","author":"Ichino Anna","year":"2020","unstructured":"Anna Ichino and Juha R\u00e4ikk\u00e4. 2020. Non-doxastic conspiracy theories. Argumenta 2020(2020), 1\u201318.","journal-title":"Argumenta"},{"volume-title":"Echo chamber: Rush Limbaugh and the conservative media establishment","author":"Jamieson Kathleen\u00a0Hall","key":"e_1_3_2_1_17_1","unstructured":"Kathleen\u00a0Hall Jamieson and Joseph\u00a0N Cappella. 2008. Echo chamber: Rush Limbaugh and the conservative media establishment. Oxford University Press."},{"key":"e_1_3_2_1_18_1","unstructured":"Kenji Kawaguchi Leslie\u00a0Pack Kaelbling and Yoshua Bengio. 2017. Generalization in deep learning. arXiv preprint arXiv:1710.05468(2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5840\/jphil20081051024"},{"key":"e_1_3_2_1_20_1","unstructured":"Thomas L\u00a0Griffiths Charles Kemp and Joshua B\u00a0Tenenbaum. 2008. Bayesian models of cognition. (2008)."},{"key":"e_1_3_2_1_21_1","volume-title":"Asymptotically efficient adaptive allocation rules. Advances in applied mathematics 6, 1","author":"Lai Tze\u00a0Leung","year":"1985","unstructured":"Tze\u00a0Leung Lai and Herbert Robbins. 1985. Asymptotically efficient adaptive allocation rules. Advances in applied mathematics 6, 1 (1985), 4\u201322."},{"key":"e_1_3_2_1_22_1","volume-title":"Bayesian approach for neural networks\u2014review and case studies. Neural networks 14, 3","author":"Lampinen Jouko","year":"2001","unstructured":"Jouko Lampinen and Aki Vehtari. 2001. Bayesian approach for neural networks\u2014review and case studies. Neural networks 14, 3 (2001), 257\u2013274."},{"key":"e_1_3_2_1_23_1","volume-title":"Biased assimilation and attitude polarization: The effects of prior theories on subsequently considered evidence. Journal of Personality and Social Psychology 37.11","author":"Lord G.","year":"1979","unstructured":"Charles\u00a0G. Lord, Lee Ross, and Mark\u00a0R. Lepper. 1979. Biased assimilation and attitude polarization: The effects of prior theories on subsequently considered evidence. Journal of Personality and Social Psychology 37.11 (1979), 2098\u20133009."},{"volume-title":"The great endarkenment: philosophy for an age of hyperspecialization","author":"Millgram Elijah","key":"e_1_3_2_1_24_1","unstructured":"Elijah Millgram. 2015. The great endarkenment: philosophy for an age of hyperspecialization. Oxford University Press."},{"key":"e_1_3_2_1_25_1","unstructured":"Kevin Murphy Yair Weiss and Michael\u00a0I Jordan. 2013. Loopy belief propagation for approximate inference: An empirical study. arXiv preprint arXiv:1301.6725(2013)."},{"key":"e_1_3_2_1_26_1","unstructured":"Behnam Neyshabur Srinadh Bhojanapalli David McAllester and Nati Srebro. 2017. Exploring generalization in deep learning. In Advances in Neural Information Processing Systems. 5947\u20135956."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1017\/epi.2018.32"},{"key":"e_1_3_2_1_28_1","volume-title":"Confirmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology 2.2","author":"Nickerson S","year":"1998","unstructured":"Raymond\u00a0S Nickerson. 1998. Confirmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology 2.2 (1998), 175\u2013220."},{"key":"e_1_3_2_1_29_1","volume-title":"Oswald and Stefan Grosjean","author":"E.","year":"2004","unstructured":"Margit\u00a0E. Oswald and Stefan Grosjean. 2004. Confirmation bias. In Cognitive illusions: A handbook on fallacies and biases in thinking, judgement and memory, R\u00fcdiger\u00a0F. Pohl (Ed.). Hove, UK: Pyschology Press, 79\u201396."},{"key":"e_1_3_2_1_30_1","volume-title":"Theory-based Bayesian models of inductive learning and reasoning. Trends in cognitive sciences 10, 7","author":"Tenenbaum B","year":"2006","unstructured":"Joshua\u00a0B Tenenbaum, Thomas\u00a0L Griffiths, and Charles Kemp. 2006. Theory-based Bayesian models of inductive learning and reasoning. Trends in cognitive sciences 10, 7 (2006), 309\u2013318."},{"key":"e_1_3_2_1_31_1","volume-title":"How to grow a mind: Statistics, structure, and abstraction. science 331, 6022","author":"Tenenbaum B","year":"2011","unstructured":"Joshua\u00a0B Tenenbaum, Charles Kemp, Thomas\u00a0L Griffiths, and Noah\u00a0D Goodman. 2011. How to grow a mind: Statistics, structure, and abstraction. science 331, 6022 (2011), 1279\u20131285."},{"volume-title":"Utility, probability, and human decision making","author":"Tversky Amos","key":"e_1_3_2_1_32_1","unstructured":"Amos Tversky and Daniel Kahneman. 1975. Judgment under uncertainty: Heuristics and biases. In Utility, probability, and human decision making. Springer, 141\u2013162."},{"volume-title":"Environmental Impact Assessment, Technology Assessment, and Risk Analysis","author":"Tversky Amos","key":"e_1_3_2_1_33_1","unstructured":"Amos Tversky and Daniel Kahneman. 1985. The framing of decisions and the psychology of choice. In Environmental Impact Assessment, Technology Assessment, and Risk Analysis. Springer, 107\u2013129."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5840\/jphil2008105931"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1933-1592.2010.00448.x"},{"key":"e_1_3_2_1_36_1","series-title":"Series B (Methodological)","volume-title":"Multi-armed bandits and the Gittins index. Journal of the Royal Statistical Society","author":"Whittle Peter","year":"1980","unstructured":"Peter Whittle. 1980. Multi-armed bandits and the Gittins index. Journal of the Royal Statistical Society. Series B (Methodological) (1980), 143\u2013149."},{"volume-title":"Knowledge and its Limits","author":"Williamson Timothy","key":"e_1_3_2_1_37_1","unstructured":"Timothy Williamson. 2002. Knowledge and its Limits. Oxford University Press."},{"volume-title":"The mathematics of generalization","author":"Wolpert H","key":"e_1_3_2_1_38_1","unstructured":"David\u00a0H Wolpert. 2018. The relationship between PAC, the statistical physics framework, the Bayesian framework, and the VC framework. In The mathematics of generalization. CRC Press, 117\u2013214."},{"key":"e_1_3_2_1_39_1","unstructured":"Chiyuan Zhang Samy Bengio Moritz Hardt Benjamin Recht and Oriol Vinyals. 2016. Understanding deep learning requires rethinking generalization. arXiv preprint arXiv:1611.03530(2016)."}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","sponsor":["ACM Association for Computing Machinery"],"location":"Seoul Republic of Korea","acronym":"FAccT '22"},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533078","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3533078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:10Z","timestamp":1750186930000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":39,"alternative-id":["10.1145\/3531146.3533078","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3533078","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}