{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:51:51Z","timestamp":1767707511890,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100002920","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["GRF-14202923"],"award-info":[{"award-number":["GRF-14202923"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714773","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:57:28Z","timestamp":1745362648000},"page":"4226-4238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Efficient Conversational Recommendations: Expected Value of Information Meets Bandit Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1390-0222","authenticated-orcid":false,"given":"Zhuohua","family":"Li","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6321-6576","authenticated-orcid":false,"given":"Maoli","family":"Liu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0179-196X","authenticated-orcid":false,"given":"Xiangxiang","family":"Dai","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7466-0384","authenticated-orcid":false,"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/TSMCA.2003.822269"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.5555\/2986459.2986717"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1214\/17-EJS1341SI"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 30th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"135","author":"Agrawal Shipra","year":"2013","unstructured":"Shipra Agrawal and Navin Goyal. 2013. Thompson Sampling for Contextual Bandits with Linear Payoffs. In Proceedings of the 30th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 28). PMLR, 127--135."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1016\/j.knosys.2011.07.021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.artint.2006.02.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2043932.2044016"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on Innovative Applications of Artificial Intelligence. AAAI Press, 363--369","author":"Chajewska Urszula","year":"2000","unstructured":"Urszula Chajewska, Daphne Koller, and Ronald Parr. 2000. Making Rational Decisions Using Adaptive Utility Elicitation. In Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on Innovative Applications of Artificial Intelligence. AAAI Press, 363--369."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2939672.2939746"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"139","author":"Cohn Robert","year":"2014","unstructured":"Robert Cohn, Satinder Singh, and Edmund Durfee. 2014. Characterizing EVOI-Sufficient k-Response Query Sets in Decision Problems. In Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 33). PMLR, 131--139."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TKDE.2024.3423442"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/TKDE.2024.3448250"},{"key":"e_1_3_2_1_13_1","volume-title":"Lui","author":"Dai Xiangxiang","year":"2025","unstructured":"Xiangxiang Dai, Yuejin Xie, Maoli Liu, Xuchuang Wang, Zhuohua Li, Huanyu Wang, and John C. S. Lui. 2025. Multi-Agent Conversational Online Learning for Adaptive LLM Response Identification. arxiv: 2501.01849 [cs.HC]"},{"key":"e_1_3_2_1_14_1","volume-title":"Artificial Intelligence","volume":"188","author":"Doshi-Velez Finale","year":"2012","unstructured":"Finale Doshi-Velez, Joelle Pineau, and Nicholas Roy. 2012. Reinforcement learning with limited reinforcement: Using Bayes risk for active learning in POMDPs. Artificial Intelligence, Vol. 187--188 (2012), 115--132."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/j.aiopen.2021.06.002"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"296","author":"Guo Shengbo","year":"2010","unstructured":"Shengbo Guo and Scott Sanner. 2010. Real-time Multiattribute Bayesian Preference Elicitation with Pairwise Comparison Queries. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 9). PMLR, 289--296."},{"key":"e_1_3_2_1_17_1","article-title":"The MovieLens Datasets","volume":"5","author":"Maxwell Harper F.","year":"2015","unstructured":"F. Maxwell Harper and Joseph A. Konstan. 2015. The MovieLens Datasets: History and Context. ACM Trans. Interact. Intell. Syst., Vol. 5, 4, Article 19 (dec 2015), 19 pages.","journal-title":"History and Context. ACM Trans. Interact. Intell. Syst."},{"volume-title":"Readings on the Principles and Applications of Decision Analysis: General collection","author":"Howard R.A.","unstructured":"R.A. Howard, J.E. Matheson, and Strategic Decisions Group. 1983. Readings on the Principles and Applications of Decision Analysis: General collection. Strategic Decisions Group.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/501158.501174"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/3327144.3327150"},{"key":"e_1_3_2_1_21_1","volume-title":"Keeney and Howard Raiffa","author":"Ralph","year":"1993","unstructured":"Ralph L. Keeney and Howard Raiffa. 1993. Decisions with Multiple Objectives: Preferences and Value Trade-Offs. Cambridge University Press."},{"volume-title":"Bandit Algorithms","author":"Lattimore Tor","unstructured":"Tor Lattimore and Csaba Szepesv\u00e1ri. 2020. Bandit Algorithms. Cambridge University Press.","key":"e_1_3_2_1_22_1"},{"volume-title":"Proceedings of the 19th International Conference on World Wide Web (WWW '10)","author":"Li Lihong","unstructured":"Lihong Li, Wei Chu, John Langford, and Robert E. Schapire. 2010. A Contextual-Bandit Approach to Personalized News Article Recommendation. In Proceedings of the 19th International Conference on World Wide Web (WWW '10). 661--670.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/3446427"},{"volume-title":"Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, IJCAI-24","author":"Li Zhuohua","unstructured":"Zhuohua Li, Maoli Liu, and John C. S. Lui. 2024. FedConPE: Efficient Federated Conversational Bandits with Heterogeneous Clients. In Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, IJCAI-24. International Joint Conferences on Artificial Intelligence Organization, 4533--4541.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.24963\/ijcai.2024\/387"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1137\/19M1247115"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/3468.983411"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"9035","author":"Sivakumar Vidyashankar","year":"2020","unstructured":"Vidyashankar Sivakumar, Steven Wu, and Arindam Banerjee. 2020. Structured Linear Contextual Bandits: A Sharp and Geometric Smoothed Analysis. In Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 119). PMLR, 9026--9035."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/990308.990310"},{"key":"e_1_3_2_1_31_1","volume-title":"Conversational Recommender System. In The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval (SIGIR '18)","author":"Sun Yueming","year":"2018","unstructured":"Yueming Sun and Yi Zhang. 2018. Conversational Recommender System. In The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval (SIGIR '18). 235--244."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"e_1_3_2_1_33_1","first-page":"4","article-title":"User-Friendly Tail Bounds for Sums of Random Matrices","volume":"12","author":"Tropp Joel A.","year":"2011","unstructured":"Joel A. Tropp. 2011. User-Friendly Tail Bounds for Sums of Random Matrices. Foundations of Computational Mathematics, Vol. 12, 4 (Aug. 2011), 389--434.","journal-title":"Foundations of Computational Mathematics"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1609\/aaai.v34i06.6592"},{"key":"e_1_3_2_1_35_1","volume-title":"Advances in Neural Information Processing Systems","volume":"23","author":"Viappiani Paolo","year":"2010","unstructured":"Paolo Viappiani and Craig Boutilier. 2010. Optimal Bayesian Recommendation Sets and Myopically Optimal Choice Query Sets. In Advances in Neural Information Processing Systems, Vol. 23."},{"key":"e_1_3_2_1_36_1","volume-title":"Efficient Explorative Key-Term Selection Strategies for Conversational Contextual Bandits. Proceedings of the AAAI Conference on Artificial Intelligence","volume":"37","author":"Wang Zhiyong","year":"2023","unstructured":"Zhiyong Wang, Xutong Liu, Shuai Li, and John C. S. Lui. 2023. Efficient Explorative Key-Term Selection Strategies for Conversational Contextual Bandits. Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 37, 8 (Jun. 2023), 10288--10295."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/3459637.3482328"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/3580305.3599539"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/3404835.3462920"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/3637528.3671892"},{"volume-title":"Proceedings of The Web Conference 2020 (WWW '20)","author":"Zhang Xiaoying","unstructured":"Xiaoying Zhang, Hong Xie, Hang Li, and John C.S. Lui. 2020. Conversational Contextual Bandit: Algorithm and Application. In Proceedings of The Web Conference 2020 (WWW '20). 662--672.","key":"e_1_3_2_1_41_1"},{"volume-title":"User Respond. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM '18)","author":"Zhang Yongfeng","unstructured":"Yongfeng Zhang, Xu Chen, Qingyao Ai, Liu Yang, and W. Bruce Croft. 2018. Towards Conversational Search and Recommendation: System Ask, User Respond. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM '18). 177--186.","key":"e_1_3_2_1_42_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/3485447.3512152"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence, UAI","author":"Zhao Zhibing","year":"2018","unstructured":"Zhibing Zhao, Haoming Li, Junming Wang, Jeffrey O. Kephart, Nicholas Mattei, Hui Su, and Lirong Xia. 2018. A Cost-Effective Framework for Preference Elicitation and Aggregation. In Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence, UAI 2018. 446--456."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1145\/3511808.3557347"}],"event":{"sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"WWW '25","name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714773","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:41Z","timestamp":1750295921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714773"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":45,"alternative-id":["10.1145\/3696410.3714773","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714773","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}