{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:06:22Z","timestamp":1760709982628,"version":"3.41.0"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:00:00Z","timestamp":1565308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Interact. Intell. Syst."],"published-print":{"date-parts":[[2020,3,31]]},"abstract":"<jats:p>\n            This work presents an extension of Thompson Sampling bandit policy for orchestrating the collection of base recommendation algorithms for e-commerce. We focus on the problem of item-to-item recommendations, for which multiple behavioral and attribute-based predictors are provided to an ensemble learner. In addition, we detail the construction of a personalized predictor based on\n            <jats:italic>k<\/jats:italic>\n            -Nearest Neighbors (\n            <jats:italic>k<\/jats:italic>\n            NN), with temporal decay capabilities and event weighting. We show how to adapt Thompson Sampling to realistic situations when neither action availability nor reward stationarity is guaranteed. Furthermore, we investigate the effects of priming the sampler with pre-set parameters of reward probability distributions by utilizing the product catalog and\/or event history, when such information is available. We report our experimental results based on the analysis of three real-world e-commerce datasets.\n          <\/jats:p>","DOI":"10.1145\/3237187","type":"journal-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:22:28Z","timestamp":1565353348000},"page":"1-32","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Bandit-Based Ensemble Framework for Exploration\/Exploitation of Diverse Recommendation Components"],"prefix":"10.1145","volume":"10","author":[{"given":"Bj\u00f6rn","family":"Brod\u00e9n","sequence":"first","affiliation":[{"name":"Apptus Technologies, Lund, Sweden"}]},{"given":"Mikael","family":"Hammar","sequence":"additional","affiliation":[{"name":"Apptus Technologies, Lund, Sweden"}]},{"given":"Bengt J.","family":"Nilsson","sequence":"additional","affiliation":[{"name":"Malm\u00f6 University, Sweden"}]},{"given":"Dimitris","family":"Paraschakis","sequence":"additional","affiliation":[{"name":"Malm\u00f6 University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,8,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461256.2461277"},{"volume-title":"Recommender Systems for Online Dating. Master\u2019s thesis","author":"Andrews Eric","key":"e_1_2_1_2_1"},{"volume-title":"Regret bounds and minimax policies under partial monitoring. J. Mach. Learn. Res. 11 (Dec","year":"2010","author":"Audibert Jean-Yves","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"volume-title":"Barger and Lauren Labrecque","year":"2013","author":"Viktor","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2798723"},{"volume-title":"M\u00fcller","year":"2015","author":"Bernardi Lucas","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.02.052"},{"volume-title":"Neural Information Processing: 21st International Conference, ICONIP","year":"2014","author":"Bouneffouf Djallel","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172967"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005458706300636"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501029"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052627"},{"volume-title":"Advances in Neural Information Processing Systems 24","author":"Chapelle Olivier","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125486.3125493"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079681"},{"volume-title":"Proceedings of the 24th Annual Conference on Learning Theory. 359--376","year":"2011","author":"Garivier Aur\u00e9lien","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2050345.2050365"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 31st International Conference on International Conference on Machine Learning -","volume":"32","author":"Gopalan Aditya","year":"2014"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2832747.2832852"},{"volume-title":"NIPS 2006 Workshop.","year":"2006","author":"Hartland C\u00e9dric","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959167"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442670.2442675"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695748"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109872"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-017-9194-1"},{"volume-title":"TempRec Workshop at ACM RecSys.","year":"2017","author":"Kamehkhosh Iman","key":"e_1_2_1_27_1"},{"volume-title":"Proceedings of the 12th International Conference on Artificial Intelligence and Statistics, number 5. 272--279","year":"2009","author":"Kanade Varun","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34106-9_18"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 28th International Conference on Neural Information Processing Systems -","volume":"1","author":"Kawale Jaya","year":"2015"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5178-7"},{"volume-title":"Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI\u201914)","year":"2014","author":"Koc\u00e1k Tom\u00e1\u0161","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1621995.1622013"},{"volume-title":"Advances in Collaborative Filtering","author":"Koren Yehuda","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 32nd International Conference on International Conference on Machine Learning -","volume":"37","author":"Kveton Branislav","year":"2015"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.076"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132926"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911548"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Li Shuai","year":"2016"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695678"},{"volume-title":"Proceedings of the 28th International Florida Artificial Intelligence Research Society Conference, FLAIRS. 67--72","year":"2015","author":"Lou\u00ebdec Jonathan","key":"e_1_2_1_44_1"},{"volume-title":"Bandits warm-up cold recommender systems. CoRR abs\/1407.2806 (June","year":"2014","author":"Mary J\u00e9r\u00e9mie","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9338-y"},{"volume-title":"Proceedings of the 16th International Conference on Artificial Intelligence and Statistics. 442--450","year":"2013","author":"Mellor Joseph","key":"e_1_2_1_47_1"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507186"},{"key":"e_1_2_1_49_1","unstructured":"Minh-Quan Nguyen. 2014. Multi-Armed Bandit Problem and Its Applications in Intelligent Tutoring Systems. Master\u2019s thesis. \u00c9cole Polytechnique.  Minh-Quan Nguyen. 2014. Multi-Armed Bandit Problem and Its Applications in Intelligent Tutoring Systems. Master\u2019s thesis. \u00c9cole Polytechnique."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.183"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190616"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109896"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390255"},{"key":"e_1_2_1_55_1","first-page":"1","article-title":"Contextual bandits with similarity information","volume":"15","author":"Slivkins Aleksandrs","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_2_1_56_1","first-page":"1","article-title":"Ranked bandits in metric spaces: Learning diverse rankings over large document collections","volume":"14","author":"Slivkins Aleksandrs","year":"2013","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981780.2981977"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645732"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109900"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959162"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/1893193.1893232"},{"volume-title":"Proceedings of the ACM RecSys Workshop on Recommender Systems Evaluation: Dimensions and Design (REDD\u201914)","year":"2014","author":"Vinagre Jo\u00e3o","key":"e_1_2_1_63_1"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623372"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133163"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505690"}],"container-title":["ACM Transactions on Interactive Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3237187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3237187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:34Z","timestamp":1750210774000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3237187"}},"subtitle":["An Experimental Study within E-Commerce"],"short-title":[],"issued":{"date-parts":[[2019,8,9]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,3,31]]}},"alternative-id":["10.1145\/3237187"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3237187","relation":{},"ISSN":["2160-6455","2160-6463"],"issn-type":[{"type":"print","value":"2160-6455"},{"type":"electronic","value":"2160-6463"}],"subject":[],"published":{"date-parts":[[2019,8,9]]},"assertion":[{"value":"2018-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}