CAREForMe: Contextual Multi-Armed Bandit Recommendation Framework for Mental Health
Abstract
References
Recommendations
A Multi-Armed Bandit Model Selection for Cold-Start User Recommendation
UMAP '17: Proceedings of the 25th Conference on User Modeling, Adaptation and PersonalizationHow can we effectively recommend items to a user about whom we have no information? This is the problem we focus on in this paper, known as the cold-start problem. In most existing works, the cold-start problem is handled through the use of many kinds ...
Transferable contextual bandit for cross-domain recommendation
AAAI'18/IAAI'18/EAAI'18: Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial IntelligenceTraditional recommendation systems (RecSys) suffer from two problems: the exploitation-exploration dilemma and the cold-start problem. One solution to solving the exploitation-exploration dilemma is the contextual bandit policy, which adaptively exploits ...
Dynamic clustering based contextual combinatorial multi-armed bandit for online recommendation
AbstractRecommender systems still face a trade-off between exploring new items to maximize user satisfaction and exploiting those already interacted with to match user interests. This problem is widely recognized as the exploration/...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Chair:
- Denys Poshyvanyk,
- Co-chair:
- Gemma Catolino,
- Program Chairs:
- Julia Rubin,
- Wing Lam
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Extended-abstract
Conference
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 59Total Downloads
- Downloads (Last 12 months)59
- Downloads (Last 6 weeks)14
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in