Skip to main content
Top
Published in: Data Mining and Knowledge Discovery 6/2019

10-08-2019

Contextual bandits with hidden contexts: a focused data capture from social media streams

Authors: Sylvain Lamprier, Thibault Gisselbrecht, Patrick Gallinari

Published in: Data Mining and Knowledge Discovery | Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper addresses the problem of real time data capture from social media. Due to different limitations, it is not possible to collect all the data produced by social networks such as Twitter. Therefore, to be able to gather enough relevant information related to a predefined need, it is necessary to focus on a subset of the information sources. In this work, we focus on user-centered data capture and consider each account of a social network as a source that can be followed at each iteration of a data capture process. This process, whose aim is to maximize the cumulative utility of the captured information for the specified need, is constrained at each time step by the number of users that can be monitored simultaneously. The problem of selecting a subset of accounts to listen to over time is a sequential decision problem under constraints, which we formalize as a bandit problem with multiple selections. In this work, we propose a contextual UCB-like approach, that uses the activity of any user during the current step to predict his future behavior. Besides the capture of usefulness variations, considering contexts also enables to improve the efficiency of the process by leveraging some structure in the search space. However, existing contextual bandit approaches do not fit for our setting where most of the contexts are hidden from the agent. We therefore propose a new algorithm, called HiddenLinUCB, which aims at dealing with such missing information via variational inference. Experiments demonstrate the very good behavior of this approach compared to existing methods for tasks of data capture from social networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
For instance on Twitter, up to 7000 messages can be released per second.
 
2
In this paper, we focus on Twitter but several other media could have been considered, such as Facebook which proposes similar real-time APIs with restrictions. The full documentation of the Twitter APIs is available at: https://​dev.​twitter.​com/​streaming/​public.
 
3
\(\Phi ^{-1}\) corresponds to the Normal inverse cumulative distribution function.
 
4
At step t, for any action i, \(q^*_{\tau _{i}}\) being a Gamma distribution with shape \(a_{i,t-1}\) and scale \(b_{i,t-1}\), the expectation \(\mathbb {E}[\tau _{i}]\) equals \(\dfrac{a_{i,t-1}}{b_{i,t-1}}\).
 
Literature
go back to reference Abbasi-Yadkori Y, Pál D, Szepesvári C (2011) Improved algorithms for linear stochastic bandits. In: Advances in neural information processing systems 24: 25th annual conference on neural information processing systems 2011. Proceedings of a meeting held 12–14 Dec 2011, Granada, Spain, pp 2312–2320 Abbasi-Yadkori Y, Pál D, Szepesvári C (2011) Improved algorithms for linear stochastic bandits. In: Advances in neural information processing systems 24: 25th annual conference on neural information processing systems 2011. Proceedings of a meeting held 12–14 Dec 2011, Granada, Spain, pp 2312–2320
go back to reference Agrawal S, Goyal N (2012a) Analysis of Thompson sampling for the multi-armed bandit problem. In: COLT 2012—the 25th annual conference on learning theory, 25–27 June 2012, Edinburgh, Scotland, pp 39.1–39.26 Agrawal S, Goyal N (2012a) Analysis of Thompson sampling for the multi-armed bandit problem. In: COLT 2012—the 25th annual conference on learning theory, 25–27 June 2012, Edinburgh, Scotland, pp 39.1–39.26
go back to reference Agrawal S, Goyal N (2012b) Further optimal regret bounds for Thompson sampling. In: Proceedings of the sixteenth international conference on artificial intelligence and statistics, PMLR 31, 2013, pp 99–107 Agrawal S, Goyal N (2012b) Further optimal regret bounds for Thompson sampling. In: Proceedings of the sixteenth international conference on artificial intelligence and statistics, PMLR 31, 2013, pp 99–107
go back to reference Agrawal S, Goyal N (2013) Thompson sampling for contextual bandits with linear payoffs. In: Proceedings of the 30th international conference on machine learning, ICML 2013, Atlanta, GA, USA, 16–21 June 2013, pp 127–135 Agrawal S, Goyal N (2013) Thompson sampling for contextual bandits with linear payoffs. In: Proceedings of the 30th international conference on machine learning, ICML 2013, Atlanta, GA, USA, 16–21 June 2013, pp 127–135
go back to reference Agarwal A, Hsu D, Kale S, Langford J, Li L, Schapire RE (2014) Taming the monster: a fast and simple algorithm for contextual bandits. In: Proceedings of the 31th international conference on machine learning (ICML), 2014, pp 1638–1646 Agarwal A, Hsu D, Kale S, Langford J, Li L, Schapire RE (2014) Taming the monster: a fast and simple algorithm for contextual bandits. In: Proceedings of the 31th international conference on machine learning (ICML), 2014, pp 1638–1646
go back to reference Alla J, Lavrenko V, Papka R (1998) Event tracking. CIIR Technical report IR—128, Department of Computer Science, University of Massachusetts Alla J, Lavrenko V, Papka R (1998) Event tracking. CIIR Technical report IR—128, Department of Computer Science, University of Massachusetts
go back to reference Audibert J, Bubeck S (2009) Minimax policies for adversarial and stochastic bandits. In: COLT 2009—the 22nd conference on learning theory, Montreal, Quebec, Canada, 18–21 June 2009 Audibert J, Bubeck S (2009) Minimax policies for adversarial and stochastic bandits. In: COLT 2009—the 22nd conference on learning theory, Montreal, Quebec, Canada, 18–21 June 2009
go back to reference Bechini A, Gazzè D, Marchetti A, Tesconi M (2016) Towards a general architecture for social media data capture from a multi-domain perspective. In: 30th IEEE international conference on advanced information networking and applications, AINA 2016, Crans-Montana, Switzerland, 23–25 Mar 2016, pp 1093–1100. https://doi.org/10.1109/AINA.2016.75 Bechini A, Gazzè D, Marchetti A, Tesconi M (2016) Towards a general architecture for social media data capture from a multi-domain perspective. In: 30th IEEE international conference on advanced information networking and applications, AINA 2016, Crans-Montana, Switzerland, 23–25 Mar 2016, pp 1093–1100. https://​doi.​org/​10.​1109/​AINA.​2016.​75
go back to reference Bishop CM (2006) Pattern recognition and machine learning (information science and statistics). Springer, New YorkMATH Bishop CM (2006) Pattern recognition and machine learning (information science and statistics). Springer, New YorkMATH
go back to reference Boanjak M, Oliveira E, Martins J, Mendes Rodrigues E, Sarmento L (2012) Twitterecho: a distributed focused crawler to support open research with twitter data. In: Proceedings of the 21st international conference companion on World Wide Web, ACM, New York, NY, USA, WWW ’12 Companion, pp 1233–1240. https://doi.org/10.1145/2187980.2188266 Boanjak M, Oliveira E, Martins J, Mendes Rodrigues E, Sarmento L (2012) Twitterecho: a distributed focused crawler to support open research with twitter data. In: Proceedings of the 21st international conference companion on World Wide Web, ACM, New York, NY, USA, WWW ’12 Companion, pp 1233–1240. https://​doi.​org/​10.​1145/​2187980.​2188266
go back to reference Bubeck S, Cesa-Bianchi N (2012) Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Found Trends Mach Learn 5(1):1–122CrossRef Bubeck S, Cesa-Bianchi N (2012) Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Found Trends Mach Learn 5(1):1–122CrossRef
go back to reference Cappé O, Garivier A, Maillard OA, Munos R, Stoltz G (2013) Kullback-Leibler upper confidence bounds for optimal sequential allocation. Ann Stat 41(3):1516–1541MathSciNetCrossRef Cappé O, Garivier A, Maillard OA, Munos R, Stoltz G (2013) Kullback-Leibler upper confidence bounds for optimal sequential allocation. Ann Stat 41(3):1516–1541MathSciNetCrossRef
go back to reference Cataldi M, Di Caro L, Schifanella C (2010) Emerging topic detection on twitter based on temporal and social terms evaluation. In: Proceedings of the tenth international workshop on multimedia data mining, ACM, New York, NY, USA, MDMKDD ’10, pp 4:1–4:10. https://doi.org/10.1145/1814245.1814249 Cataldi M, Di Caro L, Schifanella C (2010) Emerging topic detection on twitter based on temporal and social terms evaluation. In: Proceedings of the tenth international workshop on multimedia data mining, ACM, New York, NY, USA, MDMKDD ’10, pp 4:1–4:10. https://​doi.​org/​10.​1145/​1814245.​1814249
go back to reference Catanese S, Meo PD, Ferrara E, Fiumara G, Provetti A (2011) Crawling facebook for social network analysis purposes. In: Proceedings of the international conference on web intelligence, mining and semantics, WIMS 2011, Sogndal, Norway, 25–27 May 2011, p 52. https://doi.org/10.1145/1988688.1988749 Catanese S, Meo PD, Ferrara E, Fiumara G, Provetti A (2011) Crawling facebook for social network analysis purposes. In: Proceedings of the international conference on web intelligence, mining and semantics, WIMS 2011, Sogndal, Norway, 25–27 May 2011, p 52. https://​doi.​org/​10.​1145/​1988688.​1988749
go back to reference Cesa-Bianchi N, Gentile C, Zappella G (2013) A gang of bandits. In: Advances in neural information processing systems 26: 27th annual conference on neural information processing systems 2013. Proceedings of a meeting held 5–8 Dec 2013, Lake Tahoe, Nevada, US, pp 737–745 Cesa-Bianchi N, Gentile C, Zappella G (2013) A gang of bandits. In: Advances in neural information processing systems 26: 27th annual conference on neural information processing systems 2013. Proceedings of a meeting held 5–8 Dec 2013, Lake Tahoe, Nevada, US, pp 737–745
go back to reference Chakrabarti S, van den Berg M, Dom B (1999) Focused crawling: a new approach to topic-specific web resource discovery. In: Proceedings of the eighth international conference on World Wide Web, Elsevier North-Holland, Inc., New York, NY, USA, WWW ’99, pp 1623–1640 Chakrabarti S, van den Berg M, Dom B (1999) Focused crawling: a new approach to topic-specific web resource discovery. In: Proceedings of the eighth international conference on World Wide Web, Elsevier North-Holland, Inc., New York, NY, USA, WWW ’99, pp 1623–1640
go back to reference Chapelle O, Li L (2011) An empirical evaluation of Thompson sampling. In: Advances in neural information processing systems 24, 12–14 Dec 2011. Granada, Spain, pp 2249–2257 Chapelle O, Li L (2011) An empirical evaluation of Thompson sampling. In: Advances in neural information processing systems 24, 12–14 Dec 2011. Granada, Spain, pp 2249–2257
go back to reference Chen W, Wang Y, Yuan Y (2013) Combinatorial multi-armed bandit: general framework and applications. In: Proceedings of the 30th international conference on machine learning, ICML 2013, Atlanta, GA, USA, 16–21 June 2013, pp 151–159 Chen W, Wang Y, Yuan Y (2013) Combinatorial multi-armed bandit: general framework and applications. In: Proceedings of the 30th international conference on machine learning, ICML 2013, Atlanta, GA, USA, 16–21 June 2013, pp 151–159
go back to reference Chu W, Li L, Reyzin L, Schapire RE (2011) Contextual bandits with linear payoff functions. In: Proceedings of the fourteenth international conference on artificial intelligence and statistics, AISTATS 2011, Fort Lauderdale, USA, 11–13 Apr 2011, pp 208–214 Chu W, Li L, Reyzin L, Schapire RE (2011) Contextual bandits with linear payoff functions. In: Proceedings of the fourteenth international conference on artificial intelligence and statistics, AISTATS 2011, Fort Lauderdale, USA, 11–13 Apr 2011, pp 208–214
go back to reference Colbaugh R, Glass K (2011) Emerging topic detection for business intelligence via predictive analysis of ’meme’ dynamics. In: AI for business agility, papers from the 2011 AAAI spring symposium, technical report SS-11-03, Stanford, California, USA, 21–23 Mar 2011 Colbaugh R, Glass K (2011) Emerging topic detection for business intelligence via predictive analysis of ’meme’ dynamics. In: AI for business agility, papers from the 2011 AAAI spring symposium, technical report SS-11-03, Stanford, California, USA, 21–23 Mar 2011
go back to reference De Choudhury M, Lin YR, Sundaram H, Candan KS, Xie L, Kelliher A (2010) How does the data sampling strategy impact the discovery of information diffusion in social media? In: Proceedings of the 4th international association for the advancement of artificial intelligence (AAAI) conference on weblogs and social media De Choudhury M, Lin YR, Sundaram H, Candan KS, Xie L, Kelliher A (2010) How does the data sampling strategy impact the discovery of information diffusion in social media? In: Proceedings of the 4th international association for the advancement of artificial intelligence (AAAI) conference on weblogs and social media
go back to reference Gentile C, Li S, Zappella G (2014) Online clustering of bandits. In: Proceedings of the 31th international conference on machine learning, ICML 2014, Beijing, China, 21–26 June 2014, pp 757–765 Gentile C, Li S, Zappella G (2014) Online clustering of bandits. In: Proceedings of the 31th international conference on machine learning, ICML 2014, Beijing, China, 21–26 June 2014, pp 757–765
go back to reference Gisselbrecht T, Denoyer L, Gallinari P, Lamprier S (2015) Whichstreams: a dynamic approach for focused data capture from large social media. In: Proceedings of the ninth international conference on web and social media, ICWSM 2015, University of Oxford, Oxford, UK, 26–29 May 2015, pp 130–139 Gisselbrecht T, Denoyer L, Gallinari P, Lamprier S (2015) Whichstreams: a dynamic approach for focused data capture from large social media. In: Proceedings of the ninth international conference on web and social media, ICWSM 2015, University of Oxford, Oxford, UK, 26–29 May 2015, pp 130–139
go back to reference Gisselbrecht T, Lamprier S, Gallinari P (2016) Linear bandits in unknown environments. In: Machine learning and knowledge discovery in databases—European conference, ECML PKDD 2016, Riva del Garda, Italy, 19–23 Sept 2016, Proceedings, Part II, pp 282–298. https://doi.org/10.1007/978-3-319-46227-1_18 Gisselbrecht T, Lamprier S, Gallinari P (2016) Linear bandits in unknown environments. In: Machine learning and knowledge discovery in databases—European conference, ECML PKDD 2016, Riva del Garda, Italy, 19–23 Sept 2016, Proceedings, Part II, pp 282–298. https://​doi.​org/​10.​1007/​978-3-319-46227-1_​18
go back to reference Gjoka M, Kurant M, Butts CT, Markopoulou A (2010) Walking in facebook: a case study of unbiased sampling of osns. In: INFOCOM 2010. 29th IEEE international conference on computer communications, joint conference of the IEEE computer and communications societies, 15–19 Mar 2010, San Diego, CA, USA, pp 2498–2506. https://doi.org/10.1109/INFCOM.2010.5462078 Gjoka M, Kurant M, Butts CT, Markopoulou A (2010) Walking in facebook: a case study of unbiased sampling of osns. In: INFOCOM 2010. 29th IEEE international conference on computer communications, joint conference of the IEEE computer and communications societies, 15–19 Mar 2010, San Diego, CA, USA, pp 2498–2506. https://​doi.​org/​10.​1109/​INFCOM.​2010.​5462078
go back to reference Gupta P, Goel A, Lin JJ, Sharma A, Wang D, Zadeh R (2013) WTF: the who to follow service at twitter. In: 22nd international World Wide Web conference, WWW ’13, Rio de Janeiro, Brazil, 13–17 May 2013, pp 505–514 Gupta P, Goel A, Lin JJ, Sharma A, Wang D, Zadeh R (2013) WTF: the who to follow service at twitter. In: 22nd international World Wide Web conference, WWW ’13, Rio de Janeiro, Brazil, 13–17 May 2013, pp 505–514
go back to reference Hannon J, Bennett M, Smyth B (2010) Recommending twitter users to follow using content and collaborative filtering approaches. In: Proceedings of the 2010 ACM conference on recommender systems, RecSys 2010, Barcelona, Spain, 26–30 Sept 2010, pp 199–206. https://doi.org/10.1145/1864708.1864746 Hannon J, Bennett M, Smyth B (2010) Recommending twitter users to follow using content and collaborative filtering approaches. In: Proceedings of the 2010 ACM conference on recommender systems, RecSys 2010, Barcelona, Spain, 26–30 Sept 2010, pp 199–206. https://​doi.​org/​10.​1145/​1864708.​1864746
go back to reference Hoffman M, Blei DM, Wang C, Paisley J (2012) Stochastic variational inference. J Mach Learn Res 14:1303–1347MathSciNetMATH Hoffman M, Blei DM, Wang C, Paisley J (2012) Stochastic variational inference. J Mach Learn Res 14:1303–1347MathSciNetMATH
go back to reference Hong L, Davison BD (2010) Empirical study of topic modeling in twitter. In: Proceedings of the first workshop on social media analytics, 2010, pp 80–88 Hong L, Davison BD (2010) Empirical study of topic modeling in twitter. In: Proceedings of the first workshop on social media analytics, 2010, pp 80–88
go back to reference Kale S, Reyzin L, Schapire RE (2010) Non-stochastic bandit slate problems. In: Proceedings of the 23rd international conference on neural information processing systems, vol 1. Curran Associates Inc., USA, NIPS’10, pp 1054–1062 Kale S, Reyzin L, Schapire RE (2010) Non-stochastic bandit slate problems. In: Proceedings of the 23rd international conference on neural information processing systems, vol 1. Curran Associates Inc., USA, NIPS’10, pp 1054–1062
go back to reference Kazerouni A, Ghavamzadeh M, Abbasi-Yadkori Y, Van Roy B (2016) Conservative contextual linear bandits. In: Proceedings of the thirty-first conference on neural information processing systems, NIPS’17, 2017. Proceedings, pp 3913–3922 Kazerouni A, Ghavamzadeh M, Abbasi-Yadkori Y, Van Roy B (2016) Conservative contextual linear bandits. In: Proceedings of the thirty-first conference on neural information processing systems, NIPS’17, 2017. Proceedings, pp 3913–3922
go back to reference Kingma DP, Welling M (2014) Auto-encoding variational Bayes. In: Proceedings of the 2nd international conference on learning representations, ICLR’14 Kingma DP, Welling M (2014) Auto-encoding variational Bayes. In: Proceedings of the 2nd international conference on learning representations, ICLR’14
go back to reference Lage R, Denoyer L, Gallinari P, Dolog P (2013) Choosing which message to publish on social networks: a contextual bandit approach. In: Advances in social networks analysis and mining 2013, ASONAM ’13, Niagara, ON, Canada—25–29 Aug 2013, pp 620–627 Lage R, Denoyer L, Gallinari P, Dolog P (2013) Choosing which message to publish on social networks: a contextual bandit approach. In: Advances in social networks analysis and mining 2013, ASONAM ’13, Niagara, ON, Canada—25–29 Aug 2013, pp 620–627
go back to reference Lamprier S, Gisselbrecht T, Gallinari P (2017) Variational Thompson sampling for relational recurrent bandits. In: Machine learning and knowledge discovery in databases—European conference, ECML PKDD 2017, Skopje, Macedonia, 18–22 Sept 2017, proceedings, Part II, pp 405–421. https://doi.org/10.1007/978-3-319-71246-8_25 Lamprier S, Gisselbrecht T, Gallinari P (2017) Variational Thompson sampling for relational recurrent bandits. In: Machine learning and knowledge discovery in databases—European conference, ECML PKDD 2017, Skopje, Macedonia, 18–22 Sept 2017, proceedings, Part II, pp 405–421. https://​doi.​org/​10.​1007/​978-3-319-71246-8_​25
go back to reference Li L, Chu W, Langford J, Wang X (2011) Unbiased offline evaluation of contextual-bandit-based news article recommendation algorithms. In: Proceedings of the forth international conference on web search and web data mining, WSDM 2011, Hong Kong, China, 9–12 Feb 2011, pp 297–306. https://doi.org/10.1145/1935826.1935878 Li L, Chu W, Langford J, Wang X (2011) Unbiased offline evaluation of contextual-bandit-based news article recommendation algorithms. In: Proceedings of the forth international conference on web search and web data mining, WSDM 2011, Hong Kong, China, 9–12 Feb 2011, pp 297–306. https://​doi.​org/​10.​1145/​1935826.​1935878
go back to reference Li R, Wang S, Chang KC (2013) Towards social data platform: Automatic topic-focused monitor for twitter stream. In: Proceedings of the 39th international conference on very large data bases, PVLDB’13, 6(14), pp 1966–1977 Li R, Wang S, Chang KC (2013) Towards social data platform: Automatic topic-focused monitor for twitter stream. In: Proceedings of the 39th international conference on very large data bases, PVLDB’13, 6(14), pp 1966–1977
go back to reference Li L, Lu Y, Zhou D (2017) Provably optimal algorithms for generalized linear contextual bandits. In: Proceedings of the 34-th international conference on machine learning (ICML), 2017, pp 2071–2080 Li L, Lu Y, Zhou D (2017) Provably optimal algorithms for generalized linear contextual bandits. In: Proceedings of the 34-th international conference on machine learning (ICML), 2017, pp 2071–2080
go back to reference Qin L, Chen S, Zhu X (2014) Contextual combinatorial bandit and its application on diversified online recommendation. In: Proceedings of the 2014 SIAM international conference on data mining, Philadelphia, Pennsylvania, USA, 24–26 Apr 2014, pp 461–469. https://doi.org/10.1137/1.9781611973440.53 Qin L, Chen S, Zhu X (2014) Contextual combinatorial bandit and its application on diversified online recommendation. In: Proceedings of the 2014 SIAM international conference on data mining, Philadelphia, Pennsylvania, USA, 24–26 Apr 2014, pp 461–469. https://​doi.​org/​10.​1137/​1.​9781611973440.​53
go back to reference Slivkins A (2014) Contextual bandits with similarity information. J Mach Learn Res 15(1):2533–2568MathSciNetMATH Slivkins A (2014) Contextual bandits with similarity information. J Mach Learn Res 15(1):2533–2568MathSciNetMATH
go back to reference Spaan MTJ, Lima PU (2009) A decision-theoretic approach to dynamic sensor selection in camera networks. In: Proceeding of the 19th international conference on automated planning and scheduling, pp 279–304 Spaan MTJ, Lima PU (2009) A decision-theoretic approach to dynamic sensor selection in camera networks. In: Proceeding of the 19th international conference on automated planning and scheduling, pp 279–304
go back to reference Taxidou I (2013) Realtime analysis of information diffusion in social media. In: Proceedings of the 39th international conference on very large data bases, PVLDB’13, 6(12), pp 1416–1421 Taxidou I (2013) Realtime analysis of information diffusion in social media. In: Proceedings of the 39th international conference on very large data bases, PVLDB’13, 6(12), pp 1416–1421
go back to reference Taxidou I, Fischer PM (2014) Rapid: A system for real-time analysis of information diffusion in twitter. In: Proceedings of the 23rd ACM international conference on information and knowledge management, CIKM 2014, Shanghai, China, 3–7 Nov 2014, pp 2060–2062. https://doi.org/10.1145/2661829.2661849 Taxidou I, Fischer PM (2014) Rapid: A system for real-time analysis of information diffusion in twitter. In: Proceedings of the 23rd ACM international conference on information and knowledge management, CIKM 2014, Shanghai, China, 3–7 Nov 2014, pp 2060–2062. https://​doi.​org/​10.​1145/​2661829.​2661849
go back to reference Thompson W (1933) On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Bull Am Math Soc 25:285–294MATH Thompson W (1933) On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Bull Am Math Soc 25:285–294MATH
go back to reference Wang H, Can D, Kazemzadeh A, Bar F, Narayanan S (2012) A system for real-time twitter sentiment analysis of 2012 U.S. presidential election cycle. In: The 50th annual meeting of the association for computational linguistics, proceedings of the system demonstrations, 10 July 2012, Jeju Island, Korea, pp 115–120 Wang H, Can D, Kazemzadeh A, Bar F, Narayanan S (2012) A system for real-time twitter sentiment analysis of 2012 U.S. presidential election cycle. In: The 50th annual meeting of the association for computational linguistics, proceedings of the system demonstrations, 10 July 2012, Jeju Island, Korea, pp 115–120
Metadata
Title
Contextual bandits with hidden contexts: a focused data capture from social media streams
Authors
Sylvain Lamprier
Thibault Gisselbrecht
Patrick Gallinari
Publication date
10-08-2019
Publisher
Springer US
Published in
Data Mining and Knowledge Discovery / Issue 6/2019
Print ISSN: 1384-5810
Electronic ISSN: 1573-756X
DOI
https://doi.org/10.1007/s10618-019-00648-w

Other articles of this Issue 6/2019

Data Mining and Knowledge Discovery 6/2019 Go to the issue

Premium Partner