Multi-armed bandits in recommendation systems: A survey of the state-of-the-art and future directions
Abstract Recommender Systems (RSs) have assumed a crucial role in several digital
companies by directly affecting their key performance indicators. Nowadays, in this era of big …
companies by directly affecting their key performance indicators. Nowadays, in this era of big …
Collaborative filtering bandits
Classical collaborative filtering, and content-based filtering methods try to learn a static
recommendation model given training data. These approaches are far from ideal in highly …
recommendation model given training data. These approaches are far from ideal in highly …
Warm up cold-start advertisements: Improving ctr predictions via learning to learn id embeddings
Click-through rate (CTR) prediction has been one of the most central problems in
computational advertising. Lately, embedding techniques that produce low-dimensional …
computational advertising. Lately, embedding techniques that produce low-dimensional …
Online clustering of bandits
We introduce a novel algorithmic approach to content recommendation based on adaptive
clustering of exploration-exploitation (“bandit") strategies. We provide a sharp regret …
clustering of exploration-exploitation (“bandit") strategies. We provide a sharp regret …
[HTML][HTML] Survey of multiarmed bandit algorithms applied to recommendation systems
G Elena, K Milos, I Eugene - International Journal of Open …, 2021 - cyberleninka.ru
The main goal of this paper is to introduce the reader to the multiarmed bandit algorithms of
different types and to observe how the industry leveraged them in advancing …
different types and to observe how the industry leveraged them in advancing …
An optimal private stochastic-mab algorithm based on optimal private stopping rule
T Sajed, O Sheffet - International Conference on Machine …, 2019 - proceedings.mlr.press
We present a provably optimal differentially private algorithm for the stochastic multi-arm
bandit problem, as opposed to the private analogue of the UCB-algorithm (Mishra and …
bandit problem, as opposed to the private analogue of the UCB-algorithm (Mishra and …
A multi-armed bandit model selection for cold-start user recommendation
CZ Felício, KVR Paixão, CAZ Barcelos… - Proceedings of the 25th …, 2017 - dl.acm.org
How can we effectively recommend items to a user about whom we have no information?
This is the problem we focus on in this paper, known as the cold-start problem. In most …
This is the problem we focus on in this paper, known as the cold-start problem. In most …
In search of the dream team: Temporally constrained multi-armed bandits for identifying effective team structures
Team structures---roles, norms, and interaction patterns---define how teams work. HCI
researchers have theorized ideal team structures and built systems nudging teams towards …
researchers have theorized ideal team structures and built systems nudging teams towards …
Ensemble recommendations via thompson sampling: an experimental study within e-commerce
B Brodén, M Hammar, BJ Nilsson… - Proceedings of the 23rd …, 2018 - dl.acm.org
This work presents an extension of Thompson Sampling bandit policy for orchestrating the
collection of base recommendation algorithms for e-commerce. We focus on the problem of …
collection of base recommendation algorithms for e-commerce. We focus on the problem of …
On private and robust bandits
We study private and robust multi-armed bandits (MABs), where the agent receives Huber's
contaminated heavy-tailed rewards and meanwhile needs to ensure differential privacy. We …
contaminated heavy-tailed rewards and meanwhile needs to ensure differential privacy. We …