{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:13:22Z","timestamp":1772115202393,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The edge computing (EC) paradigm enhances the Quality of Service of distributed computing applications by bringing computation closer to data sources, such as sensors, IoT devices, and local servers, instead of relying solely on centralized data centers (e.g., the Cloud). In EC environments, node selection refers to the problem of determining which distributed computing nodes should be selected for performing computing tasks taking into consideration the heterogeneity of factors like limited resources, network context, and node\u2019s computational capabilities. Evidently, node selection affects the efficiency and performance of EC environments. Recent node selection strategies rely on either heuristic or optimization methods, which inherently assume static environments. However, distributed environments consist of highly heterogeneous and dynamic systems. Addressing such a dynamic nature requires node selection strategies that leverage real-time feedback information. In this paper, we propose sequential learning-based algorithms based on multi-armed bandit (MAB) systems to deal with the node selection problem. Unlike previous MAB approaches, we contribute novel MAB algorithms for node selection using deep learning expert models. To tackle the inherent uncertainty associated with nodes, we introduce ExpGradBand, a novel expert-based gradient MAB algorithm, which leverages the selection efficiency of gradient bandits with the historic contextual information. Furthermore, we evaluate and compare ExpGradBand with various MAB approaches and baselines found in the literature with and without contextual information. Our evaluation study includes comprehensive experiments that assess the performance of these methods in settings with delayed or lost contextual feedback.<\/jats:p>","DOI":"10.1007\/s00607-025-01443-w","type":"journal-article","created":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T08:04:02Z","timestamp":1740816242000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Node selection using adversarial expert-based multi-armed bandits in distributed computing"],"prefix":"10.1007","volume":"107","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0101-4458","authenticated-orcid":false,"given":"Saleh","family":"ALFahad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5338-9385","authenticated-orcid":false,"given":"Shameem Puthiya","family":"Parambath","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1517-6757","authenticated-orcid":false,"given":"Christos","family":"Anagnostopoulos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9442-3340","authenticated-orcid":false,"given":"Kostas","family":"Kolomvatsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,1]]},"reference":[{"key":"1443_CR1","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2020.101919","volume":"114","author":"S Chen","year":"2021","unstructured":"Chen S, Tao Y, Yu D, Li F, Gong B (2021) Distributed learning dynamics of multi-armed bandits for edge intelligence. J Syst Archit 114:101919","journal-title":"J Syst Archit"},{"issue":"3","key":"1443_CR2","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.1109\/TNET.2021.3058685","volume":"29","author":"C-S Yang","year":"2021","unstructured":"Yang C-S, Pedarsani R, Avestimehr AS (2021) Edge computing in the dark: leveraging contextual-combinatorial bandit and coded computing. IEEE\/ACM Trans Netw 29(3):1022\u20131031","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"1443_CR3","doi-asserted-by":"crossref","first-page":"20230115","DOI":"10.1515\/comp-2023-0115","volume":"14","author":"S AlFahad","year":"2024","unstructured":"AlFahad S, Wang Q, Anagnostopoulos C, Kolomvatsos K (2024) Task offloading in mobile edge computing using cost-based discounted optimal stopping. Open Comput Sci 14(1):20230115","journal-title":"Open Comput Sci"},{"key":"1443_CR4","doi-asserted-by":"crossref","unstructured":"Broch J, Maltz DA, Johnson DB, Hu Y-C, Jetcheva J (1998) A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th annual ACM\/IEEE international conference on mobile computing and networking, pp 85\u201397","DOI":"10.1145\/288235.288256"},{"key":"1443_CR5","doi-asserted-by":"crossref","unstructured":"Fei T, Tao S, Gao L, Guerin R (2006) How to select a good alternate path in large peer-to-peer systems? In: INFOCOM","DOI":"10.1109\/INFOCOM.2006.179"},{"issue":"3","key":"1443_CR6","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1002\/widm.1178","volume":"6","author":"P Bedi","year":"2016","unstructured":"Bedi P, Sharma C (2016) Community detection in social networks. Wiley Interdiscip Rev Data Min Knowl Discov 6(3):115\u2013135","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"issue":"18","key":"1443_CR7","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.1016\/j.comnet.2006.04.005","volume":"50","author":"F Delicato","year":"2006","unstructured":"Delicato F, Protti F, Pirmez L, Rezende JF (2006) An efficient heuristic for selecting active nodes in wireless sensor networks. Comput Netw 50(18):3701\u20133720","journal-title":"Comput Netw"},{"key":"1443_CR8","doi-asserted-by":"crossref","unstructured":"Chen H, Wu H, Tzeng N-F (2004) Grid-based approach for working node selection in wireless sensor networks. In: 2004 IEEE international conference on communications (IEEE Cat. No. 04CH37577), vol 6. IEEE, pp 3673\u20133678","DOI":"10.1109\/ICC.2004.1313228"},{"issue":"3","key":"1443_CR9","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/LCOMM.2020.3034992","volume":"25","author":"I Nikoloska","year":"2020","unstructured":"Nikoloska I, Zlatanov N (2020) Data selection scheme for energy efficient supervised learning at iot nodes. IEEE Commun Lett 25(3):859\u2013863","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"1443_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3603703","volume":"56","author":"Z Zabihi","year":"2023","unstructured":"Zabihi Z, Eftekhari Moghadam AM, Rezvani MH (2023) Reinforcement learning methods for computation offloading: a systematic review. ACM Comput Surv 56(1):1\u201341","journal-title":"ACM Comput Surv"},{"key":"1443_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546921","volume-title":"Prediction, learning, and games","author":"N Cesa-Bianchi","year":"2006","unstructured":"Cesa-Bianchi N, Lugosi G (2006) Prediction, learning, and games. Cambridge University Press, Cambridge"},{"key":"1443_CR12","unstructured":"Sinha D (2021) Optimization for online platforms. PhD thesis, Massachusetts Institute of Technology"},{"key":"1443_CR13","doi-asserted-by":"crossref","unstructured":"Wang X, Ye J, Lui JC (2022) Decentralized task offloading in edge computing: a multi-user multi-armed bandit approach. In: IEEE INFOCOM 2022-IEEE conference on computer communications. IEEE, pp 1199\u20131208","DOI":"10.1109\/INFOCOM48880.2022.9796961"},{"issue":"3","key":"1443_CR14","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","volume":"10","author":"Y Zhou","year":"2008","unstructured":"Zhou Y, Fang Y, Zhang Y (2008) Securing wireless sensor networks: a survey. IEEE Commun Surv Tutor 10(3):6\u201328","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"1443_CR15","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/COMST.2020.2970550","volume":"22","author":"X Wang","year":"2020","unstructured":"Wang X, Han Y, Leung VC, Niyato D, Yan X, Chen X (2020) Convergence of edge computing and deep learning: a comprehensive survey. IEEE Commun Surv Tutor 22(2):869\u2013904","journal-title":"IEEE Commun Surv Tutor"},{"issue":"8","key":"1443_CR16","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCOM.2018.1701069","volume":"56","author":"H Guo","year":"2018","unstructured":"Guo H, Liu J, Zhang J (2018) Computation offloading for multi-access mobile edge computing in ultra-dense networks. IEEE Commun Mag 56(8):14\u201319","journal-title":"IEEE Commun Mag"},{"issue":"11","key":"1443_CR17","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/CC.2018.8543056","volume":"15","author":"F Wei","year":"2018","unstructured":"Wei F, Chen S, Zou W (2018) A greedy algorithm for task offloading in mobile edge computing system. China Commun 15(11):149\u2013157","journal-title":"China Commun"},{"key":"1443_CR18","doi-asserted-by":"crossref","unstructured":"Gu B, Zhou Z, Mumtaz S, Frascolla V, Bashir AK (2018) Context-aware task offloading for multi-access edge computing: matching with externalities. In: 2018 IEEE Global communications conference (GLOBECOM). IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2018.8647845"},{"key":"1443_CR19","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2021.102225","volume":"118","author":"A Islam","year":"2021","unstructured":"Islam A, Debnath A, Ghose M, Chakraborty S (2021) A survey on task offloading in multi-access edge computing. J Syst Archit 118:102225","journal-title":"J Syst Archit"},{"issue":"2","key":"1443_CR20","doi-asserted-by":"crossref","first-page":"1983","DOI":"10.1007\/s11227-021-03941-y","volume":"78","author":"K Gasmi","year":"2022","unstructured":"Gasmi K, Dilek S, Tosun S, Ozdemir S (2022) A survey on computation offloading and service placement in fog computing-based iot. J Supercomput 78(2):1983\u20132014","journal-title":"J Supercomput"},{"key":"1443_CR21","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103366","volume":"202","author":"C Feng","year":"2022","unstructured":"Feng C, Han P, Zhang X, Yang B, Liu Y, Guo L (2022) Computation offloading in mobile edge computing networks: a survey. J Netw Comput Appl 202:103366","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"1443_CR22","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1109\/JSAC.2019.2894306","volume":"37","author":"HA Alameddine","year":"2019","unstructured":"Alameddine HA, Sharafeddine S, Sebbah S, Ayoubi S, Assi C (2019) Dynamic task offloading and scheduling for low-latency iot services in multi-access edge computing. IEEE J Sel Areas Commun 37(3):668\u2013682","journal-title":"IEEE J Sel Areas Commun"},{"issue":"15","key":"1443_CR23","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1049\/el.2019.1179","volume":"55","author":"W Ni","year":"2019","unstructured":"Ni W, Tian H, Lyu X, Fan S (2019) Service-dependent task offloading for multiuser mobile edge computing system. Electron Lett 55(15):839\u2013841","journal-title":"Electron Lett"},{"key":"1443_CR24","doi-asserted-by":"crossref","unstructured":"Mebrek A, Merghem-Boulahia L, Esseghir M (2017) Efficient green solution for a balanced energy consumption and delay in the iot-fog-cloud computing. In: 2017 IEEE 16th international symposium on network computing and applications (NCA). IEEE, pp 1\u20134","DOI":"10.1109\/NCA.2017.8171359"},{"issue":"6","key":"1443_CR25","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1109\/TNET.2018.2873002","volume":"26","author":"F Guo","year":"2018","unstructured":"Guo F, Zhang H, Ji H, Li X, Leung VC (2018) An efficient computation offloading management scheme in the densely deployed small cell networks with mobile edge computing. IEEE\/ACM Trans Netw 26(6):2651\u20132664","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1443_CR26","doi-asserted-by":"crossref","unstructured":"Huang X, Yang Y, Wu X (2019) A meta-heuristic computation offloading strategy for iot applications in an edge-cloud framework. In: Proceedings of the 2019 3rd international symposium on computer science and intelligent control, pp 1\u20136","DOI":"10.1145\/3386164.3390513"},{"issue":"6","key":"1443_CR27","doi-asserted-by":"crossref","first-page":"155014772110230","DOI":"10.1177\/15501477211023021","volume":"17","author":"A Abbas","year":"2021","unstructured":"Abbas A, Raza A, Aadil F, Maqsood M (2021) Meta-heuristic-based offloading task optimization in mobile edge computing. Int J Distrib Sens Netw 17(6):15501477211023020","journal-title":"Int J Distrib Sens Netw"},{"issue":"3","key":"1443_CR28","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10922-022-09660-w","volume":"30","author":"B Natesha","year":"2022","unstructured":"Natesha B, Guddeti RMR (2022) Meta-heuristic based hybrid service placement strategies for two-level fog computing architecture. J Netw Syst Manag 30(3):47","journal-title":"J Netw Syst Manag"},{"key":"1443_CR29","doi-asserted-by":"crossref","unstructured":"Zaki AM, Elsayed SA, Elgazzar K, Hassanein HS (2022) Heuristic-based proactive service migration induced by dynamic computation load in edge computing. In: GLOBECOM 2022-2022 IEEE Global communications conference. IEEE, pp 5668\u20135673","DOI":"10.1109\/GLOBECOM48099.2022.10000913"},{"issue":"1","key":"1443_CR30","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1145\/3093337.3037698","volume":"45","author":"Y Kang","year":"2017","unstructured":"Kang Y, Hauswald J, Gao C, Rovinski A, Mudge T, Mars J, Tang L (2017) Neurosurgeon: collaborative intelligence between the cloud and mobile edge. ACM SIGARCH Comput Archit News 45(1):615\u2013629","journal-title":"ACM SIGARCH Comput Archit News"},{"key":"1443_CR31","doi-asserted-by":"crossref","unstructured":"Teerapittayanon S, McDanel B, Kung H-T (2017) Distributed deep neural networks over the cloud, the edge and end devices. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 328\u2013339","DOI":"10.1109\/ICDCS.2017.226"},{"issue":"3","key":"1443_CR32","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TPDS.2021.3100298","volume":"33","author":"X Chen","year":"2021","unstructured":"Chen X, Zhang J, Lin B, Chen Z, Wolter K, Min G (2021) Energy-efficient offloading for dnn-based smart iot systems in cloud-edge environments. IEEE Trans Parallel Distrib Syst 33(3):683\u2013697","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"1443_CR33","doi-asserted-by":"crossref","first-page":"2239","DOI":"10.1109\/TITS.2020.3024233","volume":"22","author":"C Sonmez","year":"2020","unstructured":"Sonmez C, Tunca C, Ozgovde A, Ersoy C (2020) Machine learning-based workload orchestrator for vehicular edge computing. IEEE Trans Intell Transp Syst 22(4):2239\u20132251","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1443_CR34","volume":"43","author":"R Zhao","year":"2020","unstructured":"Zhao R, Wang X, Xia J, Fan L (2020) Deep reinforcement learning based mobile edge computing for intelligent internet of things. Phys Commun 43:101184","journal-title":"Phys Commun"},{"issue":"6","key":"1443_CR35","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TC.2020.2969148","volume":"69","author":"Y Zhan","year":"2020","unstructured":"Zhan Y, Guo S, Li P, Zhang J (2020) A deep reinforcement learning based offloading game in edge computing. IEEE Trans Comput 69(6):883\u2013893","journal-title":"IEEE Trans Comput"},{"issue":"7","key":"1443_CR36","doi-asserted-by":"crossref","first-page":"3870","DOI":"10.1109\/TMC.2022.3148254","volume":"22","author":"T Liu","year":"2022","unstructured":"Liu T, Ni S, Li X, Zhu Y, Kong L, Yang Y (2022) Deep reinforcement learning based approach for online service placement and computation resource allocation in edge computing. IEEE Trans Mob Comput 22(7):3870\u20133881","journal-title":"IEEE Trans Mob Comput"},{"issue":"5","key":"1443_CR37","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.3390\/s21051666","volume":"21","author":"S Sheng","year":"2021","unstructured":"Sheng S, Chen P, Chen Z, Wu L, Yao Y (2021) Deep reinforcement learning-based task scheduling in iot edge computing. Sensors 21(5):1666","journal-title":"Sensors"},{"issue":"1","key":"1443_CR38","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/TPDS.2020.3014896","volume":"32","author":"J Wang","year":"2020","unstructured":"Wang J, Hu J, Min G, Zomaya AY, Georgalas N (2020) Fast adaptive task offloading in edge computing based on meta reinforcement learning. IEEE Trans Parallel Distrib Syst 32(1):242\u2013253","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"17","key":"1443_CR39","doi-asserted-by":"crossref","first-page":"13542","DOI":"10.1109\/JIOT.2021.3066048","volume":"8","author":"J Zhu","year":"2021","unstructured":"Zhu J, Huang X, Gao X, Shao Z, Yang Y (2021) Multi-interface channel allocation in fog computing systems using Thompson sampling. IEEE Internet Things J 8(17):13542\u201313554","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"1443_CR40","doi-asserted-by":"crossref","first-page":"5278","DOI":"10.1109\/TWC.2022.3233035","volume":"22","author":"H Xiao","year":"2023","unstructured":"Xiao H, Cai L, Feng J, Pei Q, Shi W (2023) Resource optimization of mab-based reputation management for data trading in vehicular edge computing. IEEE Trans Wirel Commun 22(8):5278\u20135290","journal-title":"IEEE Trans Wirel Commun"},{"issue":"1","key":"1443_CR41","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer P, Cesa-Bianchi N, Freund Y, Schapire RE (2002) The nonstochastic multiarmed bandit problem. SIAM J Comput 32(1):48\u201377","journal-title":"SIAM J Comput"},{"key":"1443_CR42","doi-asserted-by":"crossref","unstructured":"Kawazoe\u00a0Aguilera M, Chen W, Toueg S (1997) Heartbeat: a timeout-free failure detector for quiescent reliable communication. In: Distributed algorithms: 11th international workshop, WDAG\u201997 Saarbr\u00fccken, Germany, September 24\u201326, 1997 proceedings 11. Springer, pp 126\u2013140","DOI":"10.1007\/BFb0030680"},{"key":"1443_CR43","doi-asserted-by":"crossref","unstructured":"Berlo B, Saeed A, Ozcelebi T (2020) Towards federated unsupervised representation learning. In: Proceedings of the third ACM international workshop on edge systems, analytics and networking, pp 31\u201336","DOI":"10.1145\/3378679.3394530"},{"key":"1443_CR44","doi-asserted-by":"crossref","unstructured":"Xu J, Palanisamy B, Wang Q (2021) Resilient stream processing in edge computing. In: 2021 IEEE\/ACM 21st international symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE, pp 504\u2013513","DOI":"10.1109\/CCGrid51090.2021.00060"},{"issue":"6","key":"1443_CR45","doi-asserted-by":"publisher","first-page":"3758","DOI":"10.1007\/s10618-024-01057-4","volume":"38","author":"SA Puthiya Parambath","year":"2024","unstructured":"Puthiya Parambath SA, Anagnostopoulos C, Murray-Smith R (2024) Sequential query prediction based on multi-armed bandits with ensemble of transformer experts and immediate feedback. Data Min Knowl Disc 38(6):3758\u20133782. https:\/\/doi.org\/10.1007\/s10618-024-01057-4","journal-title":"Data Min Knowl Disc"},{"key":"1443_CR46","doi-asserted-by":"crossref","unstructured":"Puthiya Parambath SA, Al-Fahad SAM, Anagnostopoulos C, Kolomvatsos K (2024) Sequential Block Elimination for Dynamic Pricing. In: The 2nd international workshop on data mining in finance (DMF 2024) at the IEEE international conference on data mining, Abu Dhabi, United Arab Emirates, 09\u201312 Dec 2024","DOI":"10.1109\/ICDMW65004.2024.00023"},{"key":"1443_CR47","unstructured":"Lewi Y, Kaplan H, Mansour Y (2020) Thompson sampling for adversarial bit prediction. In: Algorithmic learning theory. PMLR, pp 518\u2013553"},{"key":"1443_CR48","volume-title":"Reinforcement learning: an introduction","author":"RS Sutton","year":"1998","unstructured":"Sutton RS, Barto AG (1998) Reinforcement learning: an introduction. MIT Press, Cambridge"},{"key":"1443_CR49","unstructured":"Mei J, Zhong Z, Dai B, Agarwal A, Szepesvari C, Schuurmans D (2023) Stochastic gradient succeeds for bandits. In: International conference on machine learning. PMLR, pp 24325\u201324360"},{"key":"1443_CR50","unstructured":"H\u00e9liou A, Mertikopoulos P, Zhou Z (2020) Gradient-free online learning in continuous games with delayed rewards. In: International conference on machine learning. PMLR, pp 4172\u20134181"},{"key":"1443_CR51","unstructured":"Seldin Y, Szepesv\u00e1ri C, Auer P, Abbasi-Yadkori Y (2013) Evaluation and analysis of the performance of the exp3 algorithm in stochastic environments. In: European workshop on reinforcement learning. PMLR, pp 103\u2013116"},{"key":"1443_CR52","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.ins.2020.08.106","volume":"546","author":"N Gutowski","year":"2021","unstructured":"Gutowski N, Amghar T, Camp O, Chhel F (2021) Gorthaur-exp3: bandit-based selection from a portfolio of recommendation algorithms balancing the accuracy-diversity dilemma. Inf Sci 546:378\u2013396","journal-title":"Inf Sci"},{"key":"1443_CR53","unstructured":"Dani V, Kakade SM, Hayes T (2007) The price of bandit information for online optimization. Adv Neural Inf Process Syst, vol 20"},{"issue":"1","key":"1443_CR54","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139","journal-title":"J Comput Syst Sci"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01443-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-025-01443-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01443-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:58:58Z","timestamp":1743119938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-025-01443-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1443"],"URL":"https:\/\/doi.org\/10.1007\/s00607-025-01443-w","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"7 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"85"}}