{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:40:00Z","timestamp":1758267600910,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030989774"},{"type":"electronic","value":"9783030989781"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98978-1_3","type":"book-chapter","created":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T17:05:42Z","timestamp":1647968742000},"page":"29-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-Armed Bandit-Based Channel Hopping: Implementation on Embedded Devices"],"prefix":"10.1007","author":[{"given":"Konrad-Felix","family":"Krentz","sequence":"first","affiliation":[]},{"given":"Alex","family":"Kangas","sequence":"additional","affiliation":[]},{"given":"Thiemo","family":"Voigt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,23]]},"reference":[{"key":"3_CR1","unstructured":"libfixmath. https:\/\/github.com\/PetteriAimonen\/libfixmath"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"IEEE Standard 802.15.4-2020 (2020)","DOI":"10.1021\/acschembio.0c00234"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Al Nahas, B., Duquennoy, S., Iyer, V., Voigt, T.: Low-power listening goes multi-channel. In: Proceedings of the 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 2\u20139. IEEE (2014). https:\/\/doi.org\/10.1109\/DCOSS.2014.33","DOI":"10.1109\/DCOSS.2014.33"},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s41060-017-0050-5","volume":"3","author":"R Allesiardo","year":"2017","unstructured":"Allesiardo, R., F\u00e9raud, R., Maillard, O.-A.: The non-stationary stochastic multi-armed bandit problem. Int. J. Data Sci. Anal. 3(4), 267\u2013283 (2017). https:\/\/doi.org\/10.1007\/s41060-017-0050-5","journal-title":"Int. J. Data Sci. Anal."},{"issue":"2\u20133","key":"3_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2\u20133), 235\u2013256 (2002). https:\/\/doi.org\/10.1023\/A:1013689704352","journal-title":"Mach. Learn."},{"issue":"1","key":"3_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: The non-stochastic multi-armed bandit problem. SIAM J. Comput. 32(1), 48\u201377 (2002). https:\/\/doi.org\/10.1137\/S0097539701398375","journal-title":"SIAM J. Comput."},{"key":"3_CR7","unstructured":"Besbes, O., Gur, Y., Zeevi, A.: Stochastic multi-armed-bandit problem with non-stationary rewards. In: Proceedings of the Neural Information Processing Systems Conference (NIPS 2014), pp. 199\u2013207. Curran (2014)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-11917-0_6","volume-title":"Wireless Sensor Networks","author":"J Borms","year":"2010","unstructured":"Borms, J., Steenhaut, K., Lemmens, B.: Low-overhead dynamic multi-channel MAC for wireless sensor networks. In: Silva, J.S., Krishnamachari, B., Boavida, F. (eds.) EWSN 2010. LNCS, vol. 5970, pp. 81\u201396. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11917-0_6"},{"key":"3_CR9","unstructured":"Cao, Y., Wen, Z., Kveton, B., Xie, Y.: Nearly optimal adaptive procedure with change detection for piecewise-stationary bandit. In: Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS), pp. 418\u2013427. PMLR (2019)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Cheung, W.C., Simchi-Levi, D., Zhu, R.: Learning to optimize under non-stationarity. In: Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS), pp. 1079\u20131087. PMLR (2019)","DOI":"10.2139\/ssrn.3261050"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Dakdouk, H., Tarazona, E., Alami, R., F\u00e9raud, R., Papadopoulos, G.Z., Maill\u00e9, P.: Reinforcement learning techniques for optimized channel hopping in IEEE 802.15.4-TSCH networks. In: Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2018), pp. 99\u2013107. ACM (2018). https:\/\/doi.org\/10.1145\/3242102.3242110","DOI":"10.1145\/3242102.3242110"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Du, P., Roussos, G.: Adaptive time slotted channel hopping for wireless sensor networks. In: Proceedings of the 2012 4th Computer Science and Electronic Engineering Conference (CEEC 2012), pp. 29\u201334. IEEE (2012). https:\/\/doi.org\/10.1109\/CEEC.2012.6375374","DOI":"10.1109\/CEEC.2012.6375374"},{"key":"3_CR13","unstructured":"Elsts, A.: Source-node selection to increase the reliability of sensor networks for building automation. In: Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks (EWSN 2016), pp. 125\u2013136 (2016)"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Elsts, A., Fafoutis, X., Piechocki, R., Craddock, I.: Adaptive channel selection in IEEE 802.15.4 TSCH networks. In: Proceedings of the 2017 Global Internet of Things Summit (GIoTS), pp. 1\u20136. IEEE (2017). https:\/\/doi.org\/10.1109\/GIOTS.2017.8016246","DOI":"10.1109\/GIOTS.2017.8016246"},{"issue":"18","key":"3_CR15","doi-asserted-by":"publisher","first-page":"21059","DOI":"10.1109\/JSEN.2021.3093424","volume":"21","author":"M Farahmandand","year":"2021","unstructured":"Farahmandand, M., Nabi, M.: Channel quality prediction for TSCH blacklisting in highly dynamic networks: a self-supervised deep learning approach. IEEE Sens. J. 21(18), 21059\u201321068 (2021). https:\/\/doi.org\/10.1109\/JSEN.2021.3093424","journal-title":"IEEE Sens. J."},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-24412-4_16","volume-title":"Algorithmic Learning Theory","author":"A Garivier","year":"2011","unstructured":"Garivier, A., Moulines, E.: On upper-confidence bound policies for switching bandit problems. In: Kivinen, J., Szepesv\u00e1ri, C., Ukkonen, E., Zeugmann, T. (eds.) ALT 2011. LNCS (LNAI), vol. 6925, pp. 174\u2013188. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24412-4_16"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Gomes, P.H., Watteyne, T., Krishnamachari, B.: MABO-TSCH: multihop and blacklist-based optimized time synchronized channel hopping. Trans. Emerg. Telecommun. Technol. 29(7) (2018). https:\/\/doi.org\/10.1002\/ett.3223","DOI":"10.1002\/ett.3223"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"G\u00fcrsu, M., Vilgelm, M., Zoppi, S., Kellerer, W.: Reliable co-existence of 802.15.4e TSCH-based WSN and Wi-Fi in an aircraft cabin. In: Proceedings of the 2016 IEEE International Conference on Communications Workshops (ICC 2016), pp. 663\u2013668. IEEE (2016). https:\/\/doi.org\/10.1109\/ICCW.2016.7503863","DOI":"10.1109\/ICCW.2016.7503863"},{"key":"3_CR19","unstructured":"Hartland, C., Gelly, S., Baskiotis, N., Teytaud, O., Sebag, M.: Multi-armed Bandit, Dynamic Environments and Meta-Bandits (2006)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11907503_1","volume-title":"Smart Sensing and Context","author":"OD Incel","year":"2006","unstructured":"Incel, O.D., Dulman, S., Jansen, P.: Multi-channel support for dense wireless sensor networking. In: Havinga, P., Lijding, M., Meratnia, N., Wegdam, M. (eds.) EuroSSC 2006. LNCS, vol. 4272, pp. 1\u201314. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11907503_1"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Javan, N.T., Sabaei, M., Hakami, V.: Adaptive channel hopping for IEEE 802.15.4 TSCH-based networks: a dynamic Bernoulli Bandit approach. IEEE Sens. J., 1 (2021). https:\/\/doi.org\/10.1109\/JSEN.2021.3110720","DOI":"10.1109\/JSEN.2021.3110720"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Kim, Y., Shin, H., Cha, H.: Y-MAC: an energy-efficient multi-channel MAC protocol for dense wireless sensor networks. In: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 53\u201363. IEEE (2008). https:\/\/doi.org\/10.1109\/IPSN.2008.27","DOI":"10.1109\/IPSN.2008.27"},{"key":"3_CR23","unstructured":"Kocsis, L., Szepesv\u00e1ri, C.: Discounted UCB. In: Proceedings of the 2nd PASCAL Challenges Workshop (2006)"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Krentz, K.-F.: A denial-of-sleep-resilient medium access control layer for IEEE 802.15.4 networks. Ph.D. thesis, Potsdam University (2019). https:\/\/doi.org\/10.25932\/publishup-43930","DOI":"10.25932\/publishup-43930"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Krentz, K.-F., Corici, M.-I.: Poster: multipath extensions for WireGuard. In: Proceedings of the 2021 IFIP Networking Conference (IFIP Networking), pp. 1\u20133. IEEE (2021). https:\/\/doi.org\/10.23919\/IFIPNetworking52078.2021.9472775","DOI":"10.23919\/IFIPNetworking52078.2021.9472775"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Krentz, K.-F., Padmal, M., Mandal, B., Augustine, R., Voigt, T.: Dataset: enabling offline tuning of fat channel communication. In: Proceedings of the Data: Acquisition to Analysis (DATA 2021). ACM (2021). https:\/\/doi.org\/10.1145\/3485730.3494112","DOI":"10.1145\/3485730.3494112"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Li, P., Vermeulen, T., Liy, H., Pollin, S.: An adaptive channel selection scheme for reliable TSCH-based communication. In: Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS 2015), pp. 511\u2013515. IEEE (2015). https:\/\/doi.org\/10.1109\/ISWCS.2015.7454397","DOI":"10.1109\/ISWCS.2015.7454397"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Liu, F., Lee, J., Shroff, N.B.: A change-detection based framework for piecewise-stationary multi-armed bandit problem. CoRR abs\/1711.03539 (2017)","DOI":"10.1609\/aaai.v32i1.11746"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Luo, J., Su, X., Liu, B.: A reinforcement learning approach for multipath TCP data scheduling. In: Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 276\u2013280. IEEE (2019). https:\/\/doi.org\/10.1109\/CCWC.2019.8666496","DOI":"10.1109\/CCWC.2019.8666496"},{"key":"3_CR30","unstructured":"Mellor, J., Shapiro, J.: Thompson sampling in switching environments with Bayesian online change detection. In: Proceedings of the 16th International Conference on Artificial Intelligence and Statistics (AISTATS), pp. 442\u2013450. PMLR (2013)"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Oksanen, J., Koivunen, V.: Learning spectrum opportunities in non-stationary radio environments. In: Proceedings of the 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2447\u20132451. IEEE (2017). https:\/\/doi.org\/10.1109\/ICASSP.2017.7952596","DOI":"10.1109\/ICASSP.2017.7952596"},{"issue":"398","key":"3_CR32","first-page":"61","volume":"391","author":"K Pister","year":"2008","unstructured":"Pister, K., Doherty, L.: TSMP: time synchronized mesh protocol. IASTED Distrib. Sens. Netw. 391(398), 61 (2008)","journal-title":"IASTED Distrib. Sens. Netw."},{"key":"3_CR33","doi-asserted-by":"publisher","unstructured":"Salajegheh, M., Soroush, H., Kalis, A.: HYMAC: hybrid TDMA\/FDMA medium access control protocol for wireless sensor networks. In: Proceedings of the 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), pp. 1\u20135. IEEE (2007). https:\/\/doi.org\/10.1109\/PIMRC.2007.4394374","DOI":"10.1109\/PIMRC.2007.4394374"},{"key":"3_CR34","doi-asserted-by":"publisher","unstructured":"Tavakoli, R., Nabi, M., Basten, T., Goossens, K.: Enhanced time-slotted channel hopping in WSNs using non-intrusive channel-quality estimation. In: Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2015), pp. 217\u2013225. IEEE (2015). https:\/\/doi.org\/10.1109\/MASS.2015.48","DOI":"10.1109\/MASS.2015.48"},{"key":"3_CR35","unstructured":"Texas Instruments: CC2538 SoC for 2.4-GHz IEEE 802.15.4 & ZigBee\/ZigBee IP Applications User\u2019s Guide (Rev. C). http:\/\/www.ti.com\/lit\/ug\/swru319c\/swru319c.pdf"},{"issue":"5","key":"3_CR36","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/MSP.2010.937503","volume":"27","author":"CS Turner","year":"2010","unstructured":"Turner, C.S.: A fast binary logarithm algorithm. IEEE Signal Process. Mag. 27(5), 124\u2013140 (2010). https:\/\/doi.org\/10.1109\/MSP.2010.937503","journal-title":"IEEE Signal Process. Mag."},{"key":"3_CR37","doi-asserted-by":"publisher","unstructured":"Wood, A., Stankovic, J., Zhou, G.: DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2007), pp. 60\u201369. IEEE (2007). https:\/\/doi.org\/10.1109\/SAHCN.2007.4292818","DOI":"10.1109\/SAHCN.2007.4292818"},{"issue":"10","key":"3_CR38","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1109\/JSAC.2020.3000365","volume":"38","author":"H Wu","year":"2020","unstructured":"Wu, H., Alay, \u00d6., Brunstrom, A., Ferlin, S., Caso, G.: Peekaboo: learning-based multipath scheduling for dynamic heterogeneous environments. IEEE J. Sel. Areas Commun. 38(10), 2295\u20132310 (2020). https:\/\/doi.org\/10.1109\/JSAC.2020.3000365","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3_CR39","doi-asserted-by":"publisher","unstructured":"Yu, J.Y., Mannor, S.: Piecewise-stationary bandit problems with side observations. In: Proceedings of the 26th Annual International Conference on Machine Learning (ICML 2009), pp. 1177\u20131184. ACM (2009). https:\/\/doi.org\/10.1145\/1553374.1553524","DOI":"10.1145\/1553374.1553524"},{"key":"3_CR40","unstructured":"Zhou, L.: A survey on contextual multi-armed bandits. arXiv preprint arXiv:1508.03326 (2015)"},{"key":"3_CR41","doi-asserted-by":"publisher","unstructured":"Zorbas, D., Papadopoulos, G.Z., Douligeris, C.: Local or global radio channel blacklisting for IEEE 802.15.4-TSCH networks? In: Proceedings of the 2018 IEEE International Conference on Communications (ICC 2018), pp. 1\u20136. IEEE (2018). https:\/\/doi.org\/10.1109\/ICC.2018.8423007","DOI":"10.1109\/ICC.2018.8423007"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98978-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,29]],"date-time":"2023-01-29T19:44:34Z","timestamp":1675021474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98978-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030989774","9783030989781"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98978-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adda-association.org\/mln-2021\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}