{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:41:59Z","timestamp":1776105719373,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580670","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:20Z","timestamp":1681964840000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Field Test of Bandit Algorithms for Recommendations: Understanding the Validity of Assumptions on Human Preferences in Multi-armed Bandits"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9707-4529","authenticated-orcid":false,"given":"Liu","family":"Leqi","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9802-0741","authenticated-orcid":false,"given":"Giulio","family":"Zhou","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5939-4575","authenticated-orcid":false,"given":"Fatma","family":"Kilinc-Karzan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3824-4241","authenticated-orcid":false,"given":"Zachary","family":"Lipton","sequence":"additional","affiliation":[{"name":"Machine Learning Department and Tepper School of Business, Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8375-3785","authenticated-orcid":false,"given":"Alan","family":"Montgomery","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","volume-title":"Holm\u2019s sequential Bonferroni procedure. Encyclopedia of research design 1, 8","author":"Abdi Herv\u00e9","year":"2010","unstructured":"Herv\u00e9 Abdi. 2010. Holm\u2019s sequential Bonferroni procedure. Encyclopedia of research design 1, 8 (2010), 1\u20138."},{"key":"e_1_3_3_2_2_1","volume-title":"Proceedings of the 30th annual conference of the cognitive science society, Vol.\u00a0100","author":"Acuna Daniel","year":"2008","unstructured":"Daniel Acuna and Paul Schrater. 2008. Bayesian modeling of human sequential decision-making on the multi-armed bandit problem. In Proceedings of the 30th annual conference of the cognitive science society, Vol.\u00a0100. Washington, DC: Cognitive Science Society, 200\u2013300."},{"key":"e_1_3_3_2_3_1","volume-title":"Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2","author":"Auer Peter","year":"2002","unstructured":"Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2 (2002), 235\u2013256."},{"key":"e_1_3_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.5840\/soctheorpract200733137"},{"key":"e_1_3_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3411547"},{"key":"e_1_3_3_2_6_1","unstructured":"Soumya Basu Rajat Sen Sujay Sanghavi and Sanjay Shakkottai. 2019. Blocking Bandits. In Advances in Neural Information Processing Systems. 4785\u20134794."},{"key":"e_1_3_3_2_7_1","volume-title":"Satiation in discounted utility. Operations research 55, 1","author":"Baucells Manel","year":"2007","unstructured":"Manel Baucells and Rakesh\u00a0K Sarin. 2007. Satiation in discounted utility. Operations research 55, 1 (2007), 170\u2013181."},{"key":"e_1_3_3_2_8_1","volume-title":"Accounting for tastes","author":"Becker S","unstructured":"Gary\u00a0S Becker. 1996. Accounting for tastes. Harvard University Press."},{"key":"e_1_3_3_2_9_1","volume-title":"Proceedings of KDD cup and workshop, Vol.\u00a02007","author":"Bennett James","year":"2007","unstructured":"James Bennett, Stan Lanning, 2007. The netflix prize. In Proceedings of KDD cup and workshop, Vol.\u00a02007. New York, 35."},{"key":"e_1_3_3_2_10_1","volume-title":"All models are wrong, but some are useful. Robustness in Statistics 202","author":"Box GE","year":"1979","unstructured":"GE Box. 1979. All models are wrong, but some are useful. Robustness in Statistics 202, 1979 (1979), 549."},{"key":"e_1_3_3_2_11_1","volume-title":"International Conference on Artificial Intelligence and Statistics. 1168\u20131177","author":"Cella Leonardo","year":"2020","unstructured":"Leonardo Cella and Nicol\u00f2 Cesa-Bianchi. 2020. Stochastic bandits with delay-dependent payoffs. In International Conference on Artificial Intelligence and Statistics. 1168\u20131177."},{"key":"e_1_3_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290999"},{"key":"e_1_3_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441764"},{"key":"e_1_3_3_2_14_1","volume-title":"Values of User Exploration in Recommender Systems. In Fifteenth ACM Conference on Recommender Systems. 85\u201395","author":"Chen Minmin","year":"2021","unstructured":"Minmin Chen, Yuyan Wang, Can Xu, Ya Le, Mohit Sharma, Lee Richardson, Su-Lin Wu, and Ed Chi. 2021. Values of User Exploration in Recommender Systems. In Fifteenth ACM Conference on Recommender Systems. 85\u201395."},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3523227.3546758"},{"key":"e_1_3_3_2_16_1","volume-title":"Changing food preference as a function of mood. The journal of psychology 140, 4","author":"Christensen Larry","year":"2006","unstructured":"Larry Christensen and Alisa Brooks. 2006. Changing food preference as a function of mood. The journal of psychology 140, 4 (2006), 293\u2013306."},{"key":"e_1_3_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378001700401"},{"key":"e_1_3_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.282.9.833"},{"key":"e_1_3_3_2_19_1","volume-title":"Design of experiments. Br Med J 1, 3923","author":"Fisher Ronald\u00a0Aylmer","year":"1936","unstructured":"Ronald\u00a0Aylmer Fisher. 1936. Design of experiments. Br Med J 1, 3923 (1936), 554\u2013554."},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2022.104128"},{"key":"e_1_3_3_2_21_1","volume-title":"The properties and antecedents of hedonic decline. Annual review of psychology 69","author":"Galak Jeff","year":"2018","unstructured":"Jeff Galak and Joseph\u00a0P Redden. 2018. The properties and antecedents of hedonic decline. Annual review of psychology 69 (2018), 1\u201325."},{"key":"e_1_3_3_2_22_1","unstructured":"GoComics. 2021. GoComics. https:\/\/www.gocomics.com."},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843948"},{"key":"e_1_3_3_2_24_1","volume-title":"Assessing mindfulness in children and adolescents: development and validation of the Child and Adolescent Mindfulness Measure (CAMM).Psychological assessment 23, 3","author":"Greco A","year":"2011","unstructured":"Laurie\u00a0A Greco, Ruth\u00a0A Baer, and Gregory\u00a0T Smith. 2011. Assessing mindfulness in children and adolescents: development and validation of the Child and Adolescent Mindfulness Measure (CAMM).Psychological assessment 23, 3 (2011), 606."},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"crossref","unstructured":"Paul Grossman. 2008. On measuring mindfulness in psychosomatic and psychological research.(2008).","DOI":"10.1016\/j.jpsychores.2008.02.001"},{"key":"e_1_3_3_2_26_1","volume-title":"Habituation: a dual-process theory.Psychological review 77, 5","author":"Groves M","year":"1970","unstructured":"Philip\u00a0M Groves and Richard\u00a0F Thompson. 1970. Habituation: a dual-process theory.Psychological review 77, 5 (1970), 419."},{"key":"e_1_3_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-937X.2005.00338.x"},{"key":"e_1_3_3_2_28_1","unstructured":"Chester Holtz Chao Tao and Guangyu Xi. 2020. BanditPyLib: a lightweight python library for bandit algorithms. Online at: https:\/\/github.com\/Alanthink\/banditpylib. https:\/\/github.com\/Alanthink\/banditpylib Documentation at https:\/\/alanthink.github.io\/banditpylib-doc."},{"key":"e_1_3_3_2_29_1","volume-title":"Recsim: A configurable simulation platform for recommender systems. arXiv preprint arXiv:1909.04847(2019).","author":"Ie Eugene","year":"2019","unstructured":"Eugene Ie, Chih-wei Hsu, Martin Mladenov, Vihan Jain, Sanmit Narvekar, Jing Wang, Rui Wu, and Craig Boutilier. 2019. Recsim: A configurable simulation platform for recommender systems. arXiv preprint arXiv:1909.04847(2019)."},{"key":"e_1_3_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148534"},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018699"},{"key":"e_1_3_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685306"},{"key":"e_1_3_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00037"},{"key":"e_1_3_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_3_2_35_1","volume-title":"Bandit algorithms","author":"Lattimore Tor","unstructured":"Tor Lattimore and Csaba Szepesv\u00e1ri. 2020. Bandit algorithms. Cambridge University Press."},{"key":"e_1_3_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2010.07.007"},{"key":"e_1_3_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623356"},{"key":"e_1_3_3_2_38_1","unstructured":"Damien Lefortier Adith Swaminathan Xiaotao Gu Thorsten Joachims and Maarten de Rijke. 2016. Large-scale validation of counterfactual learning methods: A test-bed. arXiv preprint arXiv:1612.00367(2016)."},{"key":"e_1_3_3_2_39_1","unstructured":"Liu Leqi Fatma Kilinc-Karzan Zachary\u00a0C Lipton and Alan\u00a0L Montgomery. 2021. Rebounding Bandits for Modeling Satiation Effects. (2021)."},{"key":"e_1_3_3_2_40_1","unstructured":"Nir Levine Koby Crammer and Shie Mannor. 2017. Rotting bandits. In Advances in neural information processing systems. 3074\u20133083."},{"key":"e_1_3_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_3_2_42_1","volume-title":"Changing for the better: Preference dynamics and agent diversity","author":"Fenrong Liu","unstructured":"Fenrong Liu 2007. Changing for the better: Preference dynamics and agent diversity. Institute for Logic, Language and Computation."},{"key":"e_1_3_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488466"},{"key":"e_1_3_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240354"},{"key":"e_1_3_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403374"},{"key":"e_1_3_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2019.1918"},{"key":"e_1_3_3_2_47_1","volume-title":"Elicitation of preferences","author":"Payne W","unstructured":"John\u00a0W Payne, James\u00a0R Bettman, David\u00a0A Schkade, Norbert Schwarz, and Robin Gregory. 1999. Measuring constructed preferences: Towards a building code. In Elicitation of preferences. Springer, 243\u2013275."},{"key":"e_1_3_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0347-0520.2004.00375.x"},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2460691"},{"key":"e_1_3_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2307024"},{"key":"e_1_3_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"e_1_3_3_2_52_1","unstructured":"Yuta Saito Aihara Shunsuke Matsutani Megumi and Narita Yusuke. 2020. Open Bandit Dataset and Pipeline: Towards Realistic and Reproducible Off-Policy Evaluation. arXiv preprint arXiv:2008.07146(2020)."},{"key":"e_1_3_3_2_53_1","volume-title":"What makes us like music? Determinants of music preference.Psychology of Aesthetics, Creativity, and the Arts 4, 4","author":"Sch\u00e4fer Thomas","year":"2010","unstructured":"Thomas Sch\u00e4fer and Peter Sedlmeier. 2010. What makes us like music? Determinants of music preference.Psychology of Aesthetics, Creativity, and the Arts 4, 4 (2010), 223."},{"key":"e_1_3_3_2_54_1","volume-title":"The 22nd International Conference on Artificial Intelligence and Statistics. 2564\u20132572","author":"Seznec Julien","year":"2019","unstructured":"Julien Seznec, Andrea Locatelli, Alexandra Carpentier, Alessandro Lazaric, and Michal Valko. 2019. Rotting bandits are no harder than stochastic ones. In The 22nd International Conference on Artificial Intelligence and Statistics. 2564\u20132572."},{"key":"e_1_3_3_2_55_1","first-page":"1265","article-title":"An MDP-based recommender system","author":"Shani Guy","year":"2005","unstructured":"Guy Shani, David Heckerman, and Ronen\u00a0I Brafman. 2005. An MDP-based recommender system. Journal of Machine Learning Research 6, Sep (2005), 1265\u20131295.","journal-title":"Journal of Machine Learning Research 6"},{"key":"e_1_3_3_2_56_1","doi-asserted-by":"crossref","unstructured":"Aleksandrs Slivkins 2019. Introduction to multi-armed bandits. Foundations and Trends\u00ae in Machine Learning 12 1-2(2019) 1\u2013286.","DOI":"10.1561\/2200000068"},{"key":"e_1_3_3_2_57_1","volume-title":"International Conference on Machine Learning. 814\u2013823","author":"Swaminathan Adith","year":"2015","unstructured":"Adith Swaminathan and Thorsten Joachims. 2015. Counterfactual risk minimization: Learning from logged bandit feedback. In International Conference on Machine Learning. 814\u2013823."},{"key":"e_1_3_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224376400100304"},{"key":"e_1_3_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539073"},{"key":"e_1_3_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.040"},{"key":"e_1_3_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185994"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:55Z","timestamp":1750186975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":61,"alternative-id":["10.1145\/3544548.3580670","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580670","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}