{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:30Z","timestamp":1750309410389,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Strategic Vehicle Research and Innovation Programme of Sweden","award":["2018-01937"],"award-info":[{"award-number":["2018-01937"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679867","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"3782-3786","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Contextual Combinatorial Semi-Bandit Approach to Network Bottleneck Identification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0766-0493","authenticated-orcid":false,"given":"Fazeleh","family":"Hoseini","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, G\u00f6teborg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9162-246X","authenticated-orcid":false,"given":"Niklas","family":"\u00c5kerblom","sequence":"additional","affiliation":[{"name":"Volvo Car Corporation, G\u00f6teborg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2912-7422","authenticated-orcid":false,"given":"Morteza","family":"Haghir Chehreghani","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, G\u00f6teborg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Conference on learning theory. JMLR Workshop and Conference Proceedings, PMLR","author":"Agrawal Shipra","year":"2012","unstructured":"Shipra Agrawal and Navin Goyal. 2012. Analysis of thompson sampling for the multi-armed bandit problem. In Conference on learning theory. JMLR Workshop and Conference Proceedings, PMLR, Edinburgh, Scotland, 39--1."},{"key":"e_1_3_2_1_2_1","volume-title":"International conference on machine learning. PMLR, PMLR","author":"Agrawal Shipra","year":"2013","unstructured":"Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In International conference on machine learning. PMLR, PMLR, Atlanta, Georgia, USA, 127--135."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-022-06270-0"},{"key":"e_1_3_2_1_4_1","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","author":"Auer Peter","year":"2002","unstructured":"Peter Auer. 2002. Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research 3, Nov (2002), 397--422.","journal-title":"Journal of Machine Learning Research 3"},{"key":"e_1_3_2_1_5_1","volume-title":"International conference on machine learning. PMLR, PMLR","author":"Chen Wei","year":"2013","unstructured":"Wei Chen, Yajun Wang, and Yang Yuan. 2013. Combinatorial multi-armed bandit: General framework and applications. In International conference on machine learning. PMLR, PMLR, Atlanta, Georgia, USA, 151--159."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Edsger W Dijkstra et al. 1959. A note on two problems in connexion with graphs. Numerische mathematik 1 1 (1959) 269--271.","DOI":"10.1007\/BF01386390"},{"key":"e_1_3_2_1_7_1","volume-title":"A contextual combinatorial semi-bandit approach to network bottleneck identification. arXiv preprint arXiv:2206.08144","author":"Hoseini Fazeleh","year":"2024","unstructured":"Fazeleh Hoseini, Niklas \u00c5kerblom, and Morteza Haghir Chehreghani. 2024. A contextual combinatorial semi-bandit approach to network bottleneck identification. arXiv preprint arXiv:2206.08144 (2024)."},{"key":"e_1_3_2_1_8_1","unstructured":"Emilie Kaufmann Olivier Capp\u00e9 and Aur\u00e9lien Garivier. 2012. On Bayesian upper confidence bounds for bandit problems. In Artificial intelligence and statistics. PMLR PMLR La Palma Canary Islands 592--600."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34106-9_18"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.8.5.733"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.53"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3075985"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2014.0650"},{"key":"e_1_3_2_1_16_1","volume-title":"Abbas Kazerouni, Ian Osband, Zheng Wen, et al.","author":"Russo Daniel J","year":"2018","unstructured":"Daniel J Russo, Benjamin Van Roy, Abbas Kazerouni, Ian Osband, Zheng Wen, et al. 2018. A tutorial on thompson sampling. Foundations and Trends\u00ae in Machine Learning 11, 1 (2018), 1--96."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"e_1_3_2_1_18_1","volume-title":"Closing the Computational-Statistical Gap in Best Arm Identification for Combinatorial Semi-bandits. Advances in Neural Information Processing Systems 36","author":"Tzeng Ruo-Chun","year":"2024","unstructured":"Ruo-Chun Tzeng, Po-An Wang, Alexandre Proutiere, and Chi-Jen Lu. 2024. Closing the Computational-Statistical Gap in Best Arm Identification for Combinatorial Semi-bandits. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_2_1_19_1","volume-title":"International Conference on Machine Learning. PMLR, PMLR, 5114--5122","author":"Wang Siwei","year":"2018","unstructured":"Siwei Wang and Wei Chen. 2018. Thompson sampling for combinatorial semi-bandits. In International Conference on Machine Learning. PMLR, PMLR, 5114--5122."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8171043"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research). PMLR, 11492--11502","author":"Zhou Dongruo","year":"2020","unstructured":"Dongruo Zhou, Lihong Li, and Quanquan Gu. 2020. Neural Contextual Bandits with UCB-based Exploration. In Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research). PMLR, 11492--11502."},{"key":"e_1_3_2_1_22_1","volume-title":"Covariance-Adaptive Least-Squares Algorithm for Stochastic Combinatorial Semi-Bandits. arXiv preprint arXiv:2402.15171","author":"Zhou Julien","year":"2024","unstructured":"Julien Zhou, Pierre Gaillard, Thibaud Rahier, Houssam Zenati, and Julyan Arbel. 2024. Covariance-Adaptive Least-Squares Algorithm for Stochastic Combinatorial Semi-Bandits. arXiv preprint arXiv:2402.15171 (2024)."}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Boise ID USA","acronym":"CIKM '24"},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:08Z","timestamp":1750294688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":22,"alternative-id":["10.1145\/3627673.3679867","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679867","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}