{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:45:05Z","timestamp":1730259905787,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/ictai.2018.00161","type":"proceedings-article","created":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T02:10:51Z","timestamp":1545099051000},"page":"1048-1055","source":"Crossref","is-referenced-by-count":7,"title":["Context Enhancement for Linear Contextual Multi-Armed Bandits"],"prefix":"10.1109","author":[{"given":"Nicolas","family":"Gutowski","sequence":"first","affiliation":[]},{"given":"Tassadit","family":"Amghar","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Camp","sequence":"additional","affiliation":[]},{"given":"Fabien","family":"Chhel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1214\/14-STS504"},{"journal-title":"Action centered contextual bandits","first-page":"5979","year":"2017","author":"greenewald","key":"ref11"},{"journal-title":"Dataset Shift in Machine Learning","year":"2009","author":"quionero-candela","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref15","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration tradeoffs","volume":"3","author":"auer","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.02.052"},{"key":"ref17","first-page":"39","article-title":"Analysis of Thompson sampling for the multi-armed bandit problem","author":"agrawal","year":"2012","journal-title":"Conference on Learning Theory"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-319-12637-1_47","article-title":"A neural networks committee for the contextual bandit problem","author":"allesiardo","year":"2014","journal-title":"International Conference on Neural Information Processing"},{"key":"ref19","first-page":"81091","article-title":"Putting bandits into context: How function learning supports decision making","author":"schulz","year":"2016","journal-title":"BioRxiv"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-642-02247-0_12","article-title":"Context-aware preference model based on a study of difference between real and supposed situation data","author":"ono","year":"2009","journal-title":"User Modeling Adaptation and Personalization"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/203"},{"journal-title":"Statistical Surveys E Grebenik and CA Moser","article-title":"Sampling techniques, new york, 1953","year":"1963","author":"cochran","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2794400"},{"key":"ref6","first-page":"817","article-title":"The epoch-greedy algorithm for multi-armed bandits with side information","author":"langford","year":"2008","journal-title":"Advances in neural information processing systems"},{"volume":"1","journal-title":"Reinforcement Learning An Introduction","year":"1998","author":"sutton","key":"ref29"},{"journal-title":"From Data to Decisions","article-title":"A framework for context-aware service recommendation for mobile users: A focus on mobility in smart cities","year":"2017","author":"gutowski","key":"ref5"},{"key":"ref8","first-page":"127","article-title":"Thompson sampling for contextual bandits with linear payoffs","author":"agrawal","year":"2013","journal-title":"International Conference on Machine Learning"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref2","first-page":"2533","article-title":"Contextual bandits with similarity information","volume":"15","author":"slivkins","year":"2014","journal-title":"Journal of Machine Learning Research"},{"journal-title":"In International Joint Conferences on Artificial Intelligence (IJCAI)","article-title":"Latent contextual bandits and their application to personalized recommendations for new users","year":"2016","author":"zhou","key":"ref9"},{"key":"ref1","first-page":"321","article-title":"Context in artificial intelligence: A survey of the literature","volume":"18","author":"br\u00e9zillon","year":"1999","journal-title":"Computers and Artificial Intelligence"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-89743-1_43","article-title":"Towards an extensible context model for mobile user in smart cities","author":"boudaa","year":"2018","journal-title":"Computational Intelligence and Its Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.03.008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref23","first-page":"591","article-title":"Exploring compact reinforcement-learning representations with linear regression","author":"walsh","year":"2009","journal-title":"Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence"},{"key":"ref26","first-page":"10","article-title":"Logical analysis of data: From combinatorial optimization to medical applications","author":"hammer","year":"2005","journal-title":"Rutcor Research Report"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125659"}],"event":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","start":{"date-parts":[[2018,11,5]]},"location":"Volos","end":{"date-parts":[[2018,11,7]]}},"container-title":["2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8575556\/8575998\/08576159.pdf?arnumber=8576159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:18:45Z","timestamp":1643249925000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8576159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ictai.2018.00161","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}