iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/TVT.2014.2369425
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T07:12:42Z","timestamp":1726384362898},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"crossref","award":["STA 864\/3-3"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/tvt.2014.2369425","type":"journal-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T20:06:20Z","timestamp":1415736380000},"page":"4565-4578","source":"Crossref","is-referenced-by-count":40,"title":["Joint Channel Selection and Power Control in Infrastructureless Wireless Networks: A Multiplayer Multiarmed Bandit Framework"],"prefix":"10.1109","volume":"64","author":[{"given":"Setareh","family":"Maghsudi","sequence":"first","affiliation":[{"name":"Commun. & Inf. Theor. Group, Tech. Univ. of Berlin, Berlin, Germany"}]},{"given":"Slawomir","family":"Stanczak","sequence":"additional","affiliation":[{"name":"Commun. & Inf. Theor. Group, Tech. Univ. of Berlin, Berlin, Germany"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75225-7_16"},{"key":"ref38","first-page":"97","article-title":"Approximation to Bayes risk in repeated play","volume":"3","author":"yao","year":"1957","journal-title":"Contributions to the Theory of Games"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0465-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2006.06.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11564089_29"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022901500417"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2000.2746"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2093587"},{"key":"ref40","first-page":"639","article-title":"Adaptive online prediction by following the perturbed leader","volume":"6","author":"hutter","year":"2005","journal-title":"J Mach Learn Res"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.242"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.082010.080248"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.872890"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.837356"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2011.6125317"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2004.832154"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2214072"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.925"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2181864"},{"key":"ref28","first-page":"1307","article-title":"From external to internal regret","volume":"8","author":"blum","year":"2007","journal-title":"J Mach Learn Res"},{"key":"ref4","first-page":"1","article-title":"Learning with the bandit: A cooperative spectrum selection scheme for cognitive radio networks","author":"di","year":"0","journal-title":"Proc IEEE Global Telecommun Conf"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2230215"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.020812.111547"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.897908"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref5","first-page":"715","article-title":"Relay selection problem with no side information: An adversarial bandit approach","author":"maghsudi","year":"0","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934892"},{"key":"ref7","first-page":"1","article-title":"Sensor scheduling for hunting elusive hiding targets via Whittle's restless bandit index policy","author":"nino-moraand","year":"0","journal-title":"Proc Int Conf Netw Games Control Optim"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757646"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567124"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426587"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.092013.120862"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.020812.110025"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00182-007-0098-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462144"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/25.790549"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.072913.120881"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707117"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/BF01295851"},{"key":"ref25","first-page":"4296","article-title":"Performance enhanced transmission in device-to-device communications: Beamforming or interference cancellation?","author":"xu","year":"2012","journal-title":"Proc IEEE Global Commun Conf"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/7297784\/06953296.pdf?arnumber=6953296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:16Z","timestamp":1642004896000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6953296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":43,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2014.2369425","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10]]}}}