{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:44:09Z","timestamp":1775745849090,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030590154","type":"print"},{"value":"9783030590161","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59016-1_29","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:05:10Z","timestamp":1599743110000},"page":"346-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On-Line Learning-Based Allocationof Base Stations and Channels in Cognitive Radio Networks"],"prefix":"10.1007","author":[{"given":"Zhengyang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dongxiao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Karl","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"issue":"2\u20133","key":"29_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2\u20133), 235\u2013256 (2002). https:\/\/doi.org\/10.1023\/A:1013689704352","journal-title":"Mach. Learn."},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Avner, O., Mannor, S.: Multi-user lax communications: a multi-armed bandit approach. In: Proceedings of the 35th IEEE INFOCOM, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524557"},{"key":"29_CR3","unstructured":"Avrachenkov, K., Cottatellucci, L., Maggi, L.: Dynamic rate allocation in Markovian quasi-static multiple access channels: a game theoretic approach. In: Proceedings of the 11th WiOpt, pp. 162\u2013169 (2013)"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Besson, L., Kaufmann, E., Moy, C.: Aggregation of multi-armed bandits learning algorithms for opportunistic spectrum access. In: Proceedings of IEEE WCNC, pp. 1\u20136 (2018)","DOI":"10.1109\/WCNC.2018.8377070"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Cai, K., Liu, X., Chen, Y., Lui, J.C.S.: An online learning approach to network application optimization with guarantee. In: Proceedings of IEEE INFOCOM, pp. 2006\u20132014 (2018)","DOI":"10.1109\/INFOCOM.2018.8485906"},{"issue":"4","key":"29_CR6","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s10878-013-9623-y","volume":"29","author":"Z Cai","year":"2015","unstructured":"Cai, Z., Duan, Y., Bourgeois, A.: Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks. J. Comb. Optim. 29(4), 815\u2013835 (2015)","journal-title":"J. Comb. Optim."},{"key":"29_CR7","doi-asserted-by":"publisher","unstructured":"Chen, Q., Cai, Z., Cheng, L., Gao, H.: Low-latency data aggregation scheduling for cognitive radio networks with non-predetermined structure. IEEE Trans. Mobile Comput. (2020). https:\/\/doi.org\/10.1109\/TMC.2020.2979710","DOI":"10.1109\/TMC.2020.2979710"},{"key":"29_CR8","unstructured":"Gai, Y., Krishnamachari, B.: Decentralized online learning algorithms for opportunistic spectrum access. In: Processing of IEEE GLOBECOM, pp. 1\u20136 (2011)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Kang, S., Joo, C.: Low-complexity learning for dynamic spectrum access in multi-user multi-channel networks. In: Proceedings of The 37th IEEE INFOCOM, pp. 1\u20139 (2018)","DOI":"10.1109\/INFOCOM.2018.8485937"},{"issue":"1","key":"29_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.001.1900280","volume":"27","author":"F Li","year":"2020","unstructured":"Li, F., Yu, D., Yang, H., Yu, J., Holger, K., Cheng, X.: Multi-armed-bandit-based spectrum scheduling algorithms in wireless networks: a survey. IEEE Wirel Commun. 27(1), 24\u201330 (2020)","journal-title":"IEEE Wirel Commun."},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhao, B., Xin, Q., Liu, H.: Dynamic channel allocation for satellite internet of things via deep reinforcement learning. In: Proceedings of ICOIN, pp. 465\u2013470 (2020)","DOI":"10.1109\/ICOIN48656.2020.9016474"},{"issue":"10","key":"29_CR12","doi-asserted-by":"publisher","first-page":"4565","DOI":"10.1109\/TVT.2014.2369425","volume":"64","author":"S Maghsudi","year":"2015","unstructured":"Maghsudi, S., Stanczak, S.: Joint channel selection and power control in infrastructureless wireless networks: a multiplayer multiarmed bandit framework. IEEE Trans. Veh. Technol. 64(10), 4565\u20134578 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.adhoc.2018.10.006","volume":"85","author":"T Stahlbuhk","year":"2019","unstructured":"Stahlbuhk, T., Shrader, B., Modiano, E.: Learning algorithms for scheduling in wireless networks with unknown channel statistics. Ad Hoc Netw. 85, 131\u2013144 (2019)","journal-title":"Ad Hoc Netw."},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Teotia, V., Dhurandher, S., Woungang, I., Obaidat, S.: Markovian model based channel allocation in cognitive radio networks. In: Proceedings of IEEE International Conference on Data Science and Data Intensive Systems, pp. 478\u2013482 (2015)","DOI":"10.1109\/DSDIS.2015.124"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Gai, Y., Krishnamachari, B., Jain, R.: Learning multiuser channel allocations in cognitive radio networks: a combinatorial multi-armed bandit formulation. In: Proceedings of IEEE DySPAN, pp. 1\u20139 (2010)","DOI":"10.1109\/DYSPAN.2010.5457857"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-030-37429-7_69","volume-title":"Human Centered Computing","author":"W Zheng","year":"2019","unstructured":"Zheng, W., Wu, G., Qie, W., Zhang, Y.: Deep reinforcement learning for joint channel selection and power allocation in cognitive internet of things. In: Milo\u0161evi\u0107, D., Tang, Y., Zu, Q. (eds.) HCC 2019. LNCS, vol. 11956, pp. 683\u2013692. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37429-7_69"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Li, X., Li, F., Liu, M., Li, Z., Yin, Z.: Almost optimal channel access in multi-hop networks with unknown channel variables. In: Proceedings of the 34th IEEE ICDCS, pp. 461\u2013470 (2014)","DOI":"10.1109\/ICDCS.2014.54"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59016-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T14:37:43Z","timestamp":1619275063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59016-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590154","9783030590161"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59016-1_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}