{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:47:58Z","timestamp":1730321278162,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T00:00:00Z","timestamp":1563408000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ahold Delhaize"},{"name":"Netherlands Organisation for Scientific Research","award":["612.001.551"]},{"name":"Innovation Center for Artificial Intelligence"},{"name":"Association of Universities in the Netherlands"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,18]]},"DOI":"10.1145\/3331184.3331269","type":"proceedings-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T13:40:26Z","timestamp":1563543626000},"page":"15-24","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["To Model or to Intervene"],"prefix":"10.1145","author":[{"given":"Rolf","family":"Jagerman","sequence":"first","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]},{"given":"Harrie","family":"Oosterhuis","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]},{"given":"Maarten","family":"de Rijke","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,7,18]]},"reference":[{"volume-title":"Counterfactual Learning-to-Rank for Additive Metrics and Deep Models. arXiv preprint arXiv:1805.00065","year":"2018","author":"Agarwal Aman","key":"e_1_3_2_2_1_1"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209986"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3274274"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018712"},{"volume-title":"Proceedings of the Learning to Rank Challenge. 1--24","year":"2011","author":"Chapelle Olivier","key":"e_1_3_2_2_5_1"},{"volume-title":"Click Models for Web Search","author":"Chuklin Aleksandr","key":"e_1_3_2_2_6_1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914798"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433419"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063618"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"e_1_3_2_2_12_1","unstructured":"Thorsten Joachims. 2003. Evaluating Retrieval Performance using Clickthrough Data. Text Mining. Physica\/Springer. Thorsten Joachims. 2003. Evaluating Retrieval Performance using Clickthrough Data. Text Mining. Physica\/Springer."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076063"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229179.1229181"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914803"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018699"},{"volume-title":"BubbleRank: Safe Online Learning to Rerank. arXiv preprint arXiv:1806.05819","year":"2018","author":"Kveton Branislav","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000016"},{"volume":"310","volume-title":"Proceedings of SIGIR 2007 workshop on learning to rank for information retrieval","year":"2007","author":"Liu Tie-Yan","key":"e_1_3_2_2_20_1"},{"volume-title":"Learning to Rank and Evaluation in the Online Setting. 12th Russian Summer School in Information Retrieval (RuSSIR","year":"2018","author":"Oosterhuis Harrie","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132896"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132895"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271686"},{"volume-title":"Optimizing Ranking Models in the Online Setting","author":"Oosterhuis Harrie","key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-15712-8_25"},{"volume-title":"Probabilistic Multileave Gradient Descent","author":"Oosterhuis Harrie","key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-30671-1_50"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433429"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835804"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661952"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3019233"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Adith Swaminathan and Thorsten Joachims. 2015. Counterfactual Risk Minimization: Learning from Logged Bandit Feedback. In ICML. PMLR 814--823. Adith Swaminathan and Thorsten Joachims. 2015. Counterfactual Risk Minimization: Learning from Logged Bandit Feedback. In ICML. PMLR 814--823.","DOI":"10.1145\/2740908.2742564"},{"key":"e_1_3_2_2_32_1","unstructured":"Adith Swaminathan Akshay Krishnamurthy Alekh Agarwal Miro Dudik John Langford Damien Jose and Imed Zitouni. 2017. Off-policy Evaluation for Slate Recommendation. In NIPS. 3632--3642. Adith Swaminathan Akshay Krishnamurthy Alekh Agarwal Miro Dudik John Langford Damien Jose and Imed Zitouni. 2017. Off-policy Evaluation for Slate Recommendation. In NIPS. 3632--3642."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2015.07.002"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Philip S. Thomas Georgios Theocharous and Mohammad Ghavamzadeh. 2015. High-Confidence Off-Policy Evaluation. In AAAI. 3000--3006. Philip S. Thomas Georgios Theocharous and Mohammad Ghavamzadeh. 2015. High-Confidence Off-Policy Evaluation. In AAAI. 3000--3006.","DOI":"10.1609\/aaai.v29i1.9541"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911537"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159732"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553527"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983774"}],"event":{"name":"SIGIR '19: The 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Paris France","acronym":"SIGIR '19"},"container-title":["Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3331184.3331269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T15:51:23Z","timestamp":1673106683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331184.3331269"}},"subtitle":["A Comparison of Counterfactual and Online Learning to Rank from User Interactions"],"short-title":[],"issued":{"date-parts":[[2019,7,18]]},"references-count":38,"alternative-id":["10.1145\/3331184.3331269","10.1145\/3331184"],"URL":"https:\/\/doi.org\/10.1145\/3331184.3331269","relation":{},"subject":[],"published":{"date-parts":[[2019,7,18]]},"assertion":[{"value":"2019-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}