{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:31Z","timestamp":1750219831422,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1145\/3604915.3608870","type":"proceedings-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T22:40:23Z","timestamp":1694731223000},"page":"426-429","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["AdaptEx: A Self-Service Contextual Bandit Platform"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2433-8315","authenticated-orcid":false,"given":"William","family":"Black","sequence":"first","affiliation":[{"name":"Reinforcement Learning, Expedia Group, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0400-0043","authenticated-orcid":false,"given":"Ercument","family":"Ilhan","sequence":"additional","affiliation":[{"name":"Reinforcement Learning, Expedia Group, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0060-3787","authenticated-orcid":false,"given":"Andrea","family":"Marchini","sequence":"additional","affiliation":[{"name":"Reinforcement Learning, Expedia Group, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2473-4338","authenticated-orcid":false,"given":"Vilda","family":"Markeviciute","sequence":"additional","affiliation":[{"name":"Reinforcement Learning, Expedia Group, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543846"},{"key":"e_1_3_2_1_2_1","volume-title":"Conference on learning theory. JMLR Workshop and Conference Proceedings, 39\u20131.","author":"Agrawal Shipra","year":"2012","unstructured":"Shipra Agrawal and Navin Goyal. 2012. Analysis of thompson sampling for the multi-armed bandit problem. In Conference on learning theory. JMLR Workshop and Conference Proceedings, 39\u20131."},{"key":"e_1_3_2_1_3_1","volume-title":"International conference on machine learning. PMLR, 127\u2013135","author":"Agrawal Shipra","year":"2013","unstructured":"Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In International conference on machine learning. PMLR, 127\u2013135."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3241729"},{"key":"e_1_3_2_1_5_1","series-title":"SIAM journal on computing 32, 1","volume-title":"The nonstochastic multiarmed bandit problem","author":"Auer Peter","year":"2002","unstructured":"Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert\u00a0E Schapire. 2002. The nonstochastic multiarmed bandit problem. SIAM journal on computing 32, 1 (2002), 48\u201377."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC48606.2020.9185782"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. ACM, 135\u2013146","author":"Carbone Paris","year":"2015","unstructured":"Paris Carbone, Asterios Katsifodimos, Stephan Ewen, and Volker Markl. 2015. Apache Flink: Stream and Batch Processing in a Single Engine. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. ACM, 135\u2013146."},{"key":"e_1_3_2_1_8_1","unstructured":"Olivier Chapelle and Lihong Li. 2011. An empirical evaluation of thompson sampling. In Advances in neural information processing systems. 2249\u20132257."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2532128"},{"key":"e_1_3_2_1_10_1","first-page":"18907","article-title":"Efficient first-order contextual bandits: Prediction, allocation, and triangular discrimination","volume":"34","author":"Foster J","year":"2021","unstructured":"Dylan\u00a0J Foster and Akshay Krishnamurthy. 2021. Efficient first-order contextual bandits: Prediction, allocation, and triangular discrimination. Advances in Neural Information Processing Systems 34 (2021), 18907\u201318919.","journal-title":"Advances in Neural Information Processing Systems"},{"volume-title":"Bayesian data analysis","author":"Gelman Andrew","key":"e_1_3_2_1_11_1","unstructured":"Andrew Gelman, John\u00a0B Carlin, Hal\u00a0S Stern, and Donald\u00a0B Rubin. 1995. Bayesian data analysis. Chapman and Hall\/CRC."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE International Conference on Data Mining","author":"Kreps Jay","year":"2014","unstructured":"Jay Kreps, Neha Narkhede, and Jun Rao. 2014. Kafka: a distributed messaging system for log processing. IEEE International Conference on Data Mining (2014), 1149\u20131152."},{"volume-title":"Bandit algorithms","author":"Lattimore Tor","key":"e_1_3_2_1_13_1","unstructured":"Tor Lattimore and Csaba Szepesv\u00e1ri. 2020. Bandit algorithms. Cambridge University Press."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403374"},{"key":"e_1_3_2_1_15_1","volume-title":"August 16, 2021","author":"Parfenov Fedor","year":"2021","unstructured":"Fedor Parfenov and Pavlos Mitsoulis-Ntompos. 2021. Contextual Bandits forWebpage Module Order Optimization. In Marble-KDD 21\u2019 August 16, 2021, Singapore. ACM, New York, NY, USA. 2249\u20132257."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680834710"},{"volume-title":"Reinforcement learning: An introduction","author":"Sutton S","key":"e_1_3_2_1_17_1","unstructured":"Richard\u00a0S Sutton and Andrew\u00a0G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"e_1_3_2_1_19_1","volume-title":"Stochastic Approximation and Recursive Algorithms and Applications","author":"Yin George","unstructured":"George Yin, Harold\u00a0J. Kushner, and Qing Zhu. 2003. Stochastic Approximation and Recursive Algorithms and Applications (2nd ed.). Springer, New York.","edition":"2"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing","author":"Zaharia Matei","year":"2010","unstructured":"Matei Zaharia, Mosharaf Chowdhury, Michael\u00a0J. Franklin, Scott Shenker, and Ion Stoica. 2010. Spark: Cluster Computing with Working Sets. In Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (Boston, MA) (HotCloud\u201910). USENIX Association, USA, 10."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3546258.3546476"},{"key":"e_1_3_2_1_22_1","volume-title":"Cascading bandits for large-scale recommendation problems. arXiv preprint arXiv:1603.05359","author":"Zong Shi","year":"2016","unstructured":"Shi Zong, Hao Ni, Kenny Sung, Nan\u00a0Rosemary Ke, Zheng Wen, and Branislav Kveton. 2016. Cascading bandits for large-scale recommendation problems. arXiv preprint arXiv:1603.05359 (2016)."}],"event":{"name":"RecSys '23: Seventeenth ACM Conference on Recommender Systems","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGecom Special Interest Group on Economics and Computation"],"location":"Singapore Singapore","acronym":"RecSys '23"},"container-title":["Proceedings of the 17th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604915.3608870","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604915.3608870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:34Z","timestamp":1750178794000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604915.3608870"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":22,"alternative-id":["10.1145\/3604915.3608870","10.1145\/3604915"],"URL":"https:\/\/doi.org\/10.1145\/3604915.3608870","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]},"assertion":[{"value":"2023-09-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}