{"id":"https://openalex.org/W2798457617","doi":"https://doi.org/10.1145/3209978.3210164","title":"A/B Testing with APONE","display_name":"A/B Testing with APONE","publication_year":2018,"publication_date":"2018-06-27","ids":{"openalex":"https://openalex.org/W2798457617","doi":"https://doi.org/10.1145/3209978.3210164","mag":"2798457617"},"language":"en","primary_location":{"id":"doi:10.1145/3209978.3210164","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3209978.3210164","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 41st International ACM SIGIR Conference on Research &amp; Development in Information Retrieval","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047898572","display_name":"M\u00f3nica Marrero","orcid":"https://orcid.org/0000-0002-2359-6340"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"M\u00f3nica Marrero","raw_affiliation_strings":["Delft University of Technology, Delft, Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Delft, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084915697","display_name":"Claudia Hauff","orcid":"https://orcid.org/0000-0001-9879-6470"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Claudia Hauff","raw_affiliation_strings":["Delft University of Technology, Delft, Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Delft, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047898572"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":null,"apc_paid":null,"fwci":0.1651,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.4125837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1269","last_page":"1272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.951200008392334,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7848753929138184},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6940078735351562},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6824511885643005},{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.510952889919281},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.46671220660209656},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.45499852299690247},{"id":"https://openalex.org/keywords/web-testing","display_name":"Web testing","score":0.41853561997413635},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4004592299461365},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3810994625091553},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.349118709564209},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.30762404203414917},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.23535853624343872},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1251201629638672},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.1176043450832367}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7848753929138184},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6940078735351562},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6824511885643005},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.510952889919281},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.46671220660209656},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.45499852299690247},{"id":"https://openalex.org/C42989059","wikidata":"https://www.wikidata.org/wiki/Q7978626","display_name":"Web testing","level":5,"score":0.41853561997413635},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4004592299461365},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3810994625091553},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.349118709564209},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.30762404203414917},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.23535853624343872},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1251201629638672},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.1176043450832367}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3209978.3210164","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3209978.3210164","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 41st International ACM SIGIR Conference on Research &amp; Development in Information Retrieval","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2080770071","https://openalex.org/W2095056536","https://openalex.org/W2110228583","https://openalex.org/W2112508839","https://openalex.org/W2464171116"],"related_works":["https://openalex.org/W2350300534","https://openalex.org/W2365828106","https://openalex.org/W2369571370","https://openalex.org/W643057374","https://openalex.org/W2364392443","https://openalex.org/W2381625382","https://openalex.org/W2362190997","https://openalex.org/W4249792249","https://openalex.org/W2003115932","https://openalex.org/W2373514839"],"abstract_inverted_index":{"In":[0,138],"order":[1],"to":[2,50,60,72,102,114,133,149],"improve":[3],"long-term":[4],"retention,":[5],"ad":[6],"conversion":[7],"rates,":[8],"and":[9,64,81,99,106,110,118],"so":[10],"on,":[11],"A/B":[12,26,136],"testing":[13,27],"has":[14],"become":[15],"the":[16,153],"norm":[17],"within":[18],"Web":[19,108,112,126],"portals,":[20],"enabling":[21],"efficient":[22],"large-scale":[23],"experimentation.":[24],"While":[25],"is":[28,177],"also":[29,150],"increasingly":[30],"used":[31],"by":[32],"academic":[33],"researchers":[34,54],"(with":[35],"crowd-working":[36],"platforms":[37,46],"offering":[38],"a":[39,97,111,123,141,157,164],"large":[40,147],"pool":[41],"of":[42,155],"artificial":[43],"users),":[44],"few":[45],"are":[47],"freely":[48],"available":[49],"this":[51],"end.":[52],"Academic":[53],"usually":[55],"develop":[56],"adhoc":[57],"solutions,":[58],"leading":[59],"many":[61],"duplicated":[62],"efforts":[63],"time":[65],"spent":[66],"on":[67],"work":[68],"not":[69,130],"directly":[70],"related":[71],"one's":[73],"research.":[74],"As":[75],"an":[76,85],"alternative,":[77],"we":[78,128,145,159],"have":[79],"developed":[80],"open":[82],"sourced":[83],"APONE,":[84,156],"A":[86,174],"cademic":[87],"P":[88],"latform":[89],"for":[90],"ON":[91],"line":[92],"Experiments.":[93],"APONE":[94,171],"uses":[95],"PlanOut,":[96],"framework":[98],"high-level":[100],"language,":[101],"specify":[103],"online":[104],"experiments,":[105],"offers":[107],"services":[109],"GUI":[113],"easily":[115],"create,":[116],"manage":[117],"monitor":[119],"them.":[120],"By":[121],"building":[122],"user":[124],"friendly":[125],"application,":[127],"enable":[129],"only":[131],"experts":[132],"conduct":[134],"valid":[135],"experiments.":[137],"particular":[139],"as":[140],"secondary":[142],"use":[143],"case,":[144],"envision":[146],"classrooms":[148],"benefit":[151],"from":[152],"deployment":[154],"vision":[158],"put":[160],"into":[161],"practice":[162],"in":[163],"graduate":[165],"Information":[166],"Retrieval":[167],"course.":[168],"We":[169],"open-source":[170],"at":[172,179],"https://marrerom.github.io/APONE.":[173],"demo":[175],"version":[176],"running":[178],"http://ireplatform.ewi.tudelft.nl:8080/APONE.":[180]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
