Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/4037
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Altun, Bahadır | - |
dc.contributor.author | Kutlu, Mücahid | - |
dc.date.accessioned | 2021-01-25T11:28:55Z | - |
dc.date.available | 2021-01-25T11:28:55Z | - |
dc.date.issued | 2020-10 | |
dc.identifier.citation | Altun, B., and Kutlu, M. (2020, October). Building Test Collections using Bandit Techniques: A Reproducibility Study. In Proceedings of the 29th ACM International Conference on Information and Knowledge Management (pp. 1953-1956). | en_US |
dc.identifier.isbn | 978-145036859-9 | |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/4037 | - |
dc.identifier.uri | https://dl.acm.org/doi/10.1145/3340531.3412121 | - |
dc.description.abstract | The high cost of constructing test collections led many researchers to develop intelligent document selection methods to find relevant documents with fewer judgments than the standard pooling method requires. In this paper, we conduct a comprehensive set of experiments to evaluate six bandit-based document selection methods, in terms of evaluation reliability, fairness, and reusability of the resultant test collections. In our experiments, the best performing method varies across test collections, showing the importance of using diverse test collections for an accurate performance analysis. Our experiments with six test collections also show that Move-To-Front is the most robust method among the ones we investigate. © 2020 ACM. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.ispartof | International Conference on Information and Knowledge Management, Proceedings | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Bandit methods | en_US |
dc.subject | evaluation | en_US |
dc.subject | information retrieval | en_US |
dc.subject | test collections | en_US |
dc.title | Building Test Collections Using Bandit Techniques: a Reproducibility Study | en_US |
dc.type | Conference Object | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.startpage | 1953 | |
dc.identifier.endpage | 1956 | |
dc.authorid | 0000-0002-5660-4992 | - |
dc.identifier.wos | WOS:000749561301095 | en_US |
dc.identifier.scopus | 2-s2.0-85095863441 | en_US |
dc.institutionauthor | Kutlu, Mücahid | - |
dc.identifier.doi | 10.1145/3340531.3412121 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
WEB OF SCIENCETM
Citations
2
checked on Dec 21, 2024
Page view(s)
152
checked on Dec 16, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.