{"id":"https://openalex.org/W3021703952","doi":"https://doi.org/10.1145/3366423.3380148","title":"Conversational Contextual Bandit: Algorithm and Application","display_name":"Conversational Contextual Bandit: Algorithm and Application","publication_year":2020,"publication_date":"2020-04-20","ids":{"openalex":"https://openalex.org/W3021703952","doi":"https://doi.org/10.1145/3366423.3380148","mag":"3021703952"},"language":"en","primary_location":{"id":"doi:10.1145/3366423.3380148","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3366423.3380148","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3366423.3380148","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449449","display_name":"Xiaoying Zhang","orcid":"https://orcid.org/0000-0003-3321-5940"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoying Zhang","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109448450","display_name":"Hong Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Xie","raw_affiliation_strings":["College of Computer Science Chongqing University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455135","display_name":"Hang Li","orcid":"https://orcid.org/0000-0002-3464-3245"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hang Li","raw_affiliation_strings":["Bytedance Inc., China"],"affiliations":[{"raw_affiliation_string":"Bytedance Inc., China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068489266","display_name":"John C. S. Lui","orcid":"https://orcid.org/0000-0001-7466-0384"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"John C.S. Lui","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100449449"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":11.0878,"has_fulltext":false,"cited_by_count":80,"citation_normalized_percentile":{"value":0.98611991,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"662","last_page":"672"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7715039253234863},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7594378590583801},{"id":"https://openalex.org/keywords/regret","display_name":"Regret","score":0.7356014251708984},{"id":"https://openalex.org/keywords/conversation","display_name":"Conversation","score":0.7334160208702087},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7280126214027405},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.692878007888794},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5351147651672363},{"id":"https://openalex.org/keywords/contextual-design","display_name":"Contextual design","score":0.4830106496810913},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.447103351354599},{"id":"https://openalex.org/keywords/multi-armed-bandit","display_name":"Multi-armed bandit","score":0.4380514323711395},{"id":"https://openalex.org/keywords/online-learning","display_name":"Online learning","score":0.4169883728027344},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18033477663993835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7715039253234863},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7594378590583801},{"id":"https://openalex.org/C50817715","wikidata":"https://www.wikidata.org/wiki/Q79895177","display_name":"Regret","level":2,"score":0.7356014251708984},{"id":"https://openalex.org/C2777200299","wikidata":"https://www.wikidata.org/wiki/Q52943","display_name":"Conversation","level":2,"score":0.7334160208702087},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7280126214027405},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.692878007888794},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5351147651672363},{"id":"https://openalex.org/C71611378","wikidata":"https://www.wikidata.org/wiki/Q5165191","display_name":"Contextual design","level":3,"score":0.4830106496810913},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.447103351354599},{"id":"https://openalex.org/C123197309","wikidata":"https://www.wikidata.org/wiki/Q2882343","display_name":"Multi-armed bandit","level":3,"score":0.4380514323711395},{"id":"https://openalex.org/C2986087404","wikidata":"https://www.wikidata.org/wiki/Q15946010","display_name":"Online learning","level":2,"score":0.4169883728027344},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18033477663993835},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3366423.3380148","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3366423.3380148","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3366423.3380148","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3366423.3380148","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2112420033","https://openalex.org/W2138909795","https://openalex.org/W2340290367","https://openalex.org/W2349436533","https://openalex.org/W2358698356","https://openalex.org/W2532022121","https://openalex.org/W2809617427","https://openalex.org/W2898076813","https://openalex.org/W2949395487","https://openalex.org/W2950797952","https://openalex.org/W2950978108","https://openalex.org/W2962818688"],"related_works":["https://openalex.org/W4289341771","https://openalex.org/W3114769327","https://openalex.org/W3041944716","https://openalex.org/W4287115590","https://openalex.org/W3176376493","https://openalex.org/W3191284239","https://openalex.org/W2996787464","https://openalex.org/W2958076322","https://openalex.org/W3113630707","https://openalex.org/W2964268945"],"abstract_inverted_index":{"Contextual":[0],"bandit":[1,28,71,78,155,173],"algorithms":[2,29],"provide":[3,55],"principled":[4],"online":[5],"learning":[6,22,66,180],"solutions":[7],"to":[8,34,54,72,106,128,139,141,146,150],"balance":[9],"the":[10,21,25,35,65,99,123,152,170,196,199],"exploitation-exploration":[11],"trade-off":[12],"in":[13,45,88,117,132],"various":[14],"applications":[15,46],"such":[16],"as":[17,186,188],"recommender":[18,48],"systems.":[19],"However,":[20],"speed":[23,153],"of":[24,60,109,115,154,198],"traditional":[26,171],"contextual":[27,70,74,77,134,172],"is":[30],"often":[31],"slow":[32],"due":[33],"need":[36,53],"for":[37,111],"extensive":[38],"exploration.":[39],"This":[40],"poses":[41],"a":[42,58,102,107,113,164,178],"critical":[43],"issue":[44],"like":[47],"systems,":[49],"since":[50],"users":[51],"may":[52],"feedbacks":[56,83,95,149],"on":[57,84,96,183],"lot":[59],"uninterested":[61],"items.":[62],"To":[63],"accelerate":[64,151],"speed,":[67],"we":[68],"generalize":[69],"conversational":[73,94,133,148],"bandit.":[75],"Conversational":[76,124],"leverages":[79],"not":[80],"only":[81],"behavioral":[82],"arms":[85],"(e.g.,":[86],"articles":[87,116],"news":[89,118],"recommendation),":[90],"but":[91],"also":[92],"occasional":[93],"key-terms":[97,138],"from":[98,191],"user.":[100],"Here,":[101],"key-term":[103],"can":[104,162],"relate":[105],"subset":[108],"arms,":[110],"example,":[112],"category":[114],"recommendation.":[119],"We":[120,157],"then":[121],"design":[122],"UCB":[125],"algorithm":[126,174],"(ConUCB)":[127],"address":[129],"two":[130],"challenges":[131],"bandit:":[135],"(1)":[136],"which":[137,176],"select":[140],"conduct":[142],"conversation,":[143],"(2)":[144],"how":[145],"leverage":[147],"learning.":[156],"theoretically":[158],"prove":[159],"that":[160],"ConUCB":[161,200],"achieve":[163],"smaller":[165],"regret":[166],"upper":[167],"bound":[168],"than":[169],"LinUCB,":[175],"implies":[177],"faster":[179],"speed.":[181],"Experiments":[182],"synthetic":[184],"data,":[185],"well":[187],"real":[189],"datasets":[190],"Yelp":[192],"and":[193],"Toutiao,":[194],"demonstrate":[195],"efficacy":[197],"algorithm.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":21},{"year":2022,"cited_by_count":21},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":6}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
