{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:05:23Z","timestamp":1769760323134,"version":"3.49.0"},"reference-count":32,"publisher":"MIT Press","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Computation"],"published-print":{"date-parts":[[2015,11]]},"abstract":"<jats:p>We consider a task assignment problem in crowdsourcing, which is aimed at collecting as many reliable labels as possible within a limited budget. A challenge in this scenario is how to cope with the diversity of tasks and the task-dependent reliability of workers; for example, a worker may be good at recognizing the names of sports teams but not be familiar with cosmetics brands. We refer to this practical setting as heterogeneous crowdsourcing. In this letter, we propose a contextual bandit formulation for task assignment in heterogeneous crowdsourcing that is able to deal with the exploration-exploitation trade-off in worker selection. We also theoretically investigate the regret bounds for the proposed method and demonstrate its practical usefulness experimentally.<\/jats:p>","DOI":"10.1162\/neco_a_00782","type":"journal-article","created":{"date-parts":[[2015,9,18]],"date-time":"2015-09-18T05:13:00Z","timestamp":1442553180000},"page":"2447-2475","source":"Crossref","is-referenced-by-count":13,"title":["Bandit-Based Task Assignment for Heterogeneous Crowdsourcing"],"prefix":"10.1162","volume":"27","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science, Tokyo Institute of Technology, Meguro-ku, Tokyo 152-8552, Japan"}]},{"given":"Yao","family":"Ma","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Tokyo Institute of Technology, Meguro-ku, Tokyo 152-8552, Japan"}]},{"given":"Masashi","family":"Sugiyama","sequence":"additional","affiliation":[{"name":"Department of Complexity Science and Engineering, University of Tokyo, Bunkyo-ku, Tokyo 113-0033, Japan"}]}],"member":"281","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2012.v008a006"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"B5","author":"Bubeck S.","year":"2010","journal-title":"Bandits games and clustering foundations"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921"},{"key":"B8","first-page":"64","author":"Chen X.","year":"2013","journal-title":"Proceedings of the 30th International Conference on Machine Learning"},{"issue":"1","key":"B9","first-page":"20","volume":"28","author":"Dawid A. P.","year":"1979","journal-title":"Journal of the Royal Statistical Society, C"},{"issue":"1","key":"B10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"Dempster A. P.","year":"1977","journal-title":"Journal of the Royal Statistical Society, B"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557053"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0354-1"},{"key":"B13","author":"Goel G.","year":"2014","journal-title":"Proceedings of the Second AAAI Conference on Human Computation and Crowdsourcing"},{"key":"B14","doi-asserted-by":"crossref","first-page":"287","DOI":"10.7551\/mitpress\/8996.003.0012","volume-title":"Optimization for machine learning","author":"Hazan E.","year":"2011"},{"key":"B15","first-page":"534","author":"Ho C.","year":"2013","journal-title":"Proceedings of the 30th International Conference on Machine Learning"},{"key":"B16","first-page":"45","author":"Ho C.","year":"2012","journal-title":"Proceedings of the 26th AAAI Conference on Artificial Intelligence"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1145\/1837885.1837906"},{"key":"B18","author":"Kaelbling L. P.","year":"1990","journal-title":"Learning in embedded systems"},{"key":"B19","first-page":"73","author":"Kajino H.","year":"2012","journal-title":"Proceedings of the 26th AAAI Conference on Artificial Intelligence"},{"key":"B20","first-page":"1953","volume-title":"Advances in neural information processing systems, 24","author":"Karger D.","year":"2011"},{"key":"B21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01555-7","author":"Law E.","year":"2011","journal-title":"Human computation"},{"key":"B22","first-page":"3","author":"Lewis D. D.","year":"1994","journal-title":"Proceedings of the 17th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval"},{"key":"B23","first-page":"701","volume-title":"Advances in neural information processing systems, 25","author":"Liu Q.","year":"2012"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487593"},{"key":"B25","first-page":"1297","volume":"11","author":"Raykar V. C.","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1561\/2200000018"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1145\/2692359.2692364"},{"key":"B28","first-page":"1085","volume-title":"Advances in neural information processing systems, 7","author":"Smyth P.","year":"1994"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613751"},{"key":"B30","first-page":"2424","volume-title":"Advances in neural information processing systems, 23","author":"Welinder P.","year":"2010"},{"key":"B31","first-page":"25","author":"Welinder P.","year":"2010","journal-title":"Workshop on Advancing Computer Vision with Humans in the Loop at CVPR"},{"key":"B32","first-page":"932","author":"Yan Y.","year":"2010","journal-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics"},{"key":"B33","first-page":"2204","volume-title":"Advances in neural information processing systems, 25","author":"Zhou D.","year":"2012"}],"container-title":["Neural Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mitpressjournals.org\/doi\/pdf\/10.1162\/NECO_a_00782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T05:50:39Z","timestamp":1718085039000},"score":1,"resource":{"primary":{"URL":"https:\/\/direct.mit.edu\/neco\/article\/27\/11\/2447-2475\/8118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":32,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["10.1162\/NECO_a_00782"],"URL":"https:\/\/doi.org\/10.1162\/neco_a_00782","relation":{},"ISSN":["0899-7667","1530-888X"],"issn-type":[{"value":"0899-7667","type":"print"},{"value":"1530-888X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11]]}}}