{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:13:24Z","timestamp":1767626004551,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T00:00:00Z","timestamp":1642550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T00:00:00Z","timestamp":1642550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12083-021-01265-5","type":"journal-article","created":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T08:03:43Z","timestamp":1642579423000},"page":"1189-1213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A resource allocation scheme for D2D communications with unknown channel state information"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0798-3981","authenticated-orcid":false,"given":"Vesal","family":"Hakami","sequence":"first","affiliation":[]},{"given":"Hadi","family":"Barghi","sequence":"additional","affiliation":[]},{"given":"Seyedakbar","family":"Mostafavi","sequence":"additional","affiliation":[]},{"given":"Ziba","family":"Arefinezhad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,19]]},"reference":[{"key":"1265_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad M, Azam M, Naeem M, Iqbal M, Anpalagan A, Haneef M (2017) Resource management in d2d communication: An optimization perspective. J Netw Comput Appl 93","DOI":"10.1016\/j.jnca.2017.03.017"},{"key":"1265_CR2","doi-asserted-by":"crossref","unstructured":"Alamouti SM, Sharafat AR (2014) Resource allocation for energy-efficient device-to-device communication in 4g networks","DOI":"10.1109\/ISTEL.2014.7000861"},{"key":"1265_CR3","doi-asserted-by":"crossref","unstructured":"Alamouti SM, Sharafat AR (2016) Resource allocation for device-to-device communications in multi-cell lte-advanced wireless networks with c-ran architecture. in ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT). IEEE pp.\u00a01\u20138","DOI":"10.1109\/ITU-WT.2016.7805717"},{"key":"1265_CR4","doi-asserted-by":"crossref","unstructured":"Ansari RI, Hassan SA, Chrysostomou C (2016) Energy efficient relay selection in multi-hop d2d networks. In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC)\u00a0pp.\u00a0620\u2013625","DOI":"10.1109\/IWCMC.2016.7577128"},{"key":"1265_CR5","doi-asserted-by":"crossref","unstructured":"Burghal D, Molisch AF (2013) Location aware training scheme for d2d networks. In 2013 Asilomar Conference on Signals, Systems and Computers\u00a0pp.\u00a01705\u20131708","DOI":"10.1109\/ACSSC.2013.6810591"},{"issue":"3","key":"1265_CR6","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/MWC.2015.7143335","volume":"22","author":"Y Cao","year":"2015","unstructured":"Cao Y, Jiang T, Wang C (2015) Cooperative device-to-device communications in cellular networks. IEEE Wirel Commun 22(3):124\u2013129","journal-title":"IEEE Wirel Commun"},{"key":"1265_CR7","doi-asserted-by":"crossref","unstructured":"Chen N, Tian H, Wang Z (2014) Resource allocation for intra-cluster d2d communications based on kuhn-munkres algorithm","DOI":"10.1109\/VTCFall.2014.6966155"},{"key":"1265_CR8","unstructured":"Chen W, Wang L, Zhao H, Zheng K (2020) Combinatorial semi-bandit in the non-stationary environment. CoRR abs\/2002.03580"},{"key":"1265_CR9","unstructured":"Chen W, Wang Y, Yuan Y (2013) Combinatorial multi-armed bandit: General framework and applications"},{"key":"1265_CR10","unstructured":"Chen W, Wang Y, Yuan Y, Wang Q (2016) Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. J Mach 17"},{"key":"1265_CR11","doi-asserted-by":"crossref","unstructured":"Chithra R, Bestak R, Patra SK (2015) Hungarian method based joint transmission mode and relay selection in device-to-device communication 8:261\u2013268","DOI":"10.1109\/WMNC.2015.33"},{"issue":"8","key":"1265_CR12","doi-asserted-by":"publisher","first-page":"3541","DOI":"10.1109\/TCOMM.2013.071013.120787","volume":"61","author":"D Feng","year":"2013","unstructured":"Feng D, Lu L, Yuan-Wu Y, Li GY, Feng G, Li S (2013) Device-to-device communications underlaying cellular networks. IEEE Trans Commun 61(8):3541\u20133551","journal-title":"IEEE Trans Commun"},{"issue":"5","key":"1265_CR13","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/TNET.2011.2181864","volume":"20","author":"Y Gai","year":"2012","unstructured":"Gai Y, Krishnamachari B, Jain R (2012) Combinatorial network optimization with unknown variables: Multi-armed bandits with linear rewards and individual observations. IEEE\/ACM Trans Netw 20(5):1466\u20131478","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1265_CR14","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jnca.2016.06.004","volume":"71","author":"P Gandotra","year":"2016","unstructured":"Gandotra P, Jha RK (2016) Device-to-device communication in cellular networks: A survey. J Netw Comput Appl 71:99\u2013117","journal-title":"J Netw Comput Appl"},{"key":"1265_CR15","doi-asserted-by":"crossref","unstructured":"Gao P, Yang Z, Pei L, Du J, Chen M (2018) Energy-efficient mode selection and resource allocation for relay-assisted d2d communications","DOI":"10.1109\/ICCW.2018.8403676"},{"key":"1265_CR16","first-page":"833","volume":"84","author":"A Grover","year":"2018","unstructured":"Grover A, Markov T, Attia P, Jin N, Perkins N, Cheong B, Chen M, Yang Z, Harris S, Chueh W, Ermon S (2018) Best arm identification in multi-armed bandits with delayed feedback. In Proceedings of the Twenty-First International Conference on Artificial Intelligence and Statistics 84:833\u2013842","journal-title":"In Proceedings of the Twenty-First International Conference on Artificial Intelligence and Statistics"},{"key":"1265_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/el.2013.4009","volume":"50","author":"J Han","year":"2014","unstructured":"Han J, Cui Q, Yang C, Tao X (2014) Bipartite matching approach to optimal resource allocation in device to device underlaying cellular network. Electron Lett 50:3","journal-title":"Electron Lett"},{"key":"1265_CR18","doi-asserted-by":"crossref","unstructured":"He R, Ai B, St\u00fcber GL, Zhong Z (2017) Non-stationary mobile-to-mobile channel modeling using the gauss-markov mobility model. In 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP)\u00a0pp.\u00a01\u20136","DOI":"10.1109\/WCSP.2017.8170996"},{"issue":"11","key":"1265_CR19","doi-asserted-by":"publisher","first-page":"10433","DOI":"10.1109\/TVT.2017.2751641","volume":"66","author":"Y He","year":"2017","unstructured":"He Y, Zhang Z, Yu FR, Zhao N, Yin H, Leung VCM, Zhang Y (2017) Deep-reinforcement-learning-based optimization for cache-enabled opportunistic interference alignment wireless networks. IEEE Trans Veh Technol 66(11):10433\u201310445","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"1265_CR20","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/LCOMM.2016.2617863","volume":"21","author":"TD Hoang","year":"2016","unstructured":"Hoang TD, Le LB, Le-Ngoc T (2016) Joint mode selection and resource allocation for relay-based d2d communications. IEEE Commun Lett 21(2):398\u2013401","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"1265_CR21","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1109\/COMST.2018.2828120","volume":"20","author":"F Jameel","year":"2018","unstructured":"Jameel F, Hamid Z, Jabeen F, Zeadally S, Javed MA (2018) A survey of device-to-device communications: Research issues and challenges. IEEE Commun Surv Tutorials 20(3):2133\u20132168","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1265_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TVT.2020.3027013","volume":"69","author":"J Jang","year":"2020","unstructured":"Jang J, Yang HJ (2020) Deep reinforcement learning-based resource allocation and power control in small cells with limited information exchange. IEEE Trans Veh Technol 69:11","journal-title":"IEEE Trans Veh Technol"},{"key":"1265_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-020-00962-x","volume":"14","author":"S Jayakumar","year":"2021","unstructured":"Jayakumar S, Nandakumar S (2021) A review on resource allocation techniques in d2d communication for 5g and b5g technology. Peer-to-Peer Netw Appl 14:1","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"6","key":"1265_CR24","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/LWC.2014.2338318","volume":"3","author":"T Kim","year":"2014","unstructured":"Kim T, Dong M (2014) An iterative hungarian method to joint relay selection and resource allocation for d2d communications. IEEE Wirel Commun Lett 3(6):625\u2013628","journal-title":"IEEE Wirel Commun Lett"},{"issue":"1","key":"1265_CR25","first-page":"83","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn HW (1955) The hungarian method for the assignment problem. Nav 2(1):83\u201397","journal-title":"Nav"},{"key":"1265_CR26","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TVT.2019.2947605","volume":"69","author":"R Li","year":"2020","unstructured":"Li R, Hong P, Xue K, Zhang M, Yang T (2020) Energy-efficient resource allocation for high-rate underlay d2d communications with statistical csi: A one-to-many strategy. IEEE Trans Veh Technol 69:4","journal-title":"IEEE Trans Veh Technol"},{"key":"1265_CR27","first-page":"10","volume":"13","author":"X Li","year":"2016","unstructured":"Li X, Zhang W, Zhang H, Li W (2016) A combining call admission control and power control scheme for d2d communications underlaying cellular networks. China Commun 13:10","journal-title":"China Commun"},{"issue":"6","key":"1265_CR28","doi-asserted-by":"publisher","first-page":"5331","DOI":"10.1109\/TVT.2018.2810162","volume":"67","author":"Y Li","year":"2018","unstructured":"Li Y, Zhang Z, Wang H, Yang Q (2018) Sers: Social-aware energy-efficient relay selection in d2d communications. IEEE Trans Veh Technol 67(6):5331\u20135345","journal-title":"IEEE Trans Veh Technol"},{"key":"1265_CR29","first-page":"7","volume":"65","author":"L Liang","year":"2017","unstructured":"Liang L, Li GY, Xu W (2017) Resource allocation for d2d-enabled vehicular communications. IEEE Trans Commun 65:7","journal-title":"IEEE Trans Commun"},{"key":"1265_CR30","first-page":"5","volume":"13","author":"Z Liu","year":"2020","unstructured":"Liu Z, Li X, Yuan Y, Guan X (2020) Power control of d2d communication based on quality of service assurance under imperfect channel information. Peer-to-Peer Netw Appl 13:5","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1265_CR31","doi-asserted-by":"crossref","unstructured":"Luo L, Chai R (2020) Cost-efficient uav deployment for content fetching in cellular d2d systems. in IEEE Vehicular Technology Conference","DOI":"10.1109\/VTC2020-Fall49728.2020.9348606"},{"key":"1265_CR32","doi-asserted-by":"crossref","unstructured":"Ma B, Shah-Mansouri H, Wong VWS (2016) A matching approach for power efficient relay selection in full duplex d2d networks. In IEEE International Conference on Communications ICC\u00a0pp.\u00a01\u20136","DOI":"10.1109\/ICC.2016.7511462"},{"issue":"9","key":"1265_CR33","doi-asserted-by":"publisher","first-page":"8303","DOI":"10.1109\/TVT.2017.2682123","volume":"66","author":"R Ma","year":"2017","unstructured":"Ma R, Chang Y-J, Chen H-H, Chiu C-Y (2017) On relay selection schemes for relay-assisted d2d communications in lte-a systems. IEEE Trans Veh Technol 66(9):8303\u20138314","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"1265_CR34","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MWC.2017.1500385WC","volume":"24","author":"R Ma","year":"2017","unstructured":"Ma, R., Xia, N., Chen, H.-H., Chiu, C.-Y., and Yang, C.-S. Mode selection, radio resource allocation, and power coordination in d2d communications. IEEE Wirel. Commun. 24, 3 (2017), 112\u2013121","journal-title":"IEEE Wirel Commun"},{"issue":"4","key":"1265_CR35","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1109\/TVT.2015.2423691","volume":"65","author":"S Maghsudi","year":"2015","unstructured":"Maghsudi S, Stanczak S (2015) Hybrid centralized-distributed resource allocation for device-to-device communication underlaying cellular networks. IEEE Trans Veh Technol 65(4):2481\u20132495","journal-title":"IEEE Trans Veh Technol"},{"key":"1265_CR36","doi-asserted-by":"crossref","unstructured":"Moussaid A, Jaafar W, Ajib W, Elbiaze H (2018) Deep reinforcement learning-based data transmission for d2d communications. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)\u00a0pp.\u00a01\u20137","DOI":"10.1109\/WiMOB.2018.8589114"},{"key":"1265_CR37","first-page":"7","volume":"17","author":"A Omri","year":"2018","unstructured":"Omri A, Hasna MO (2018) A distance-based mode selection scheme for d2d-enabled networks with mobility. IEEE Trans Wirel Commun 17:7","journal-title":"IEEE Trans Wirel Commun"},{"key":"1265_CR38","doi-asserted-by":"crossref","unstructured":"Qiu Y, Ji Z, Zhu Y, Meng G, Xie G (2018) Joint mode selection and power adaptation for d2d communication with reinforcement learning","DOI":"10.1109\/ISWCS.2018.8491238"},{"key":"1265_CR39","volume-title":"Wireless Communications: Principles and Practice","author":"TS Rappaport","year":"2001","unstructured":"Rappaport TS (2001) Wireless Communications: Principles and Practice. Prentice Hall, Communications Engineering and Emerging Technologies Series"},{"key":"1265_CR40","doi-asserted-by":"crossref","unstructured":"Shamganth K, Sibley MJ (2017) A survey on relay selection in cooperative device-to-device (d2d) communication for 5g cellular networks. In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)\u00a0pp.\u00a042\u201346","DOI":"10.1109\/ICECDS.2017.8390216"},{"key":"1265_CR41","first-page":"9","volume":"35","author":"B Sklar","year":"1997","unstructured":"Sklar B (1997) Rayleigh fading channels in mobile digital communication systems part i: Characterization. IEEE Commun Mag 35:9","journal-title":"IEEE Commun Mag"},{"key":"1265_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TNN.1998.712192","volume":"9","author":"RS Sutton","year":"1998","unstructured":"Sutton RS, Barto AG (1998) Reinforcement learning: An introduction. IEEE Trans Neural Netw 9:5","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"1265_CR43","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1561\/1300000050","volume":"8","author":"C Tekin","year":"2015","unstructured":"Tekin C, Liu M (2015) Online learning methods for networking. Found Trends Netw 8(4):281\u2013409","journal-title":"Found Trends Netw"},{"issue":"11","key":"1265_CR44","doi-asserted-by":"publisher","first-page":"7594","DOI":"10.1109\/TWC.2016.2604813","volume":"15","author":"R Wang","year":"2016","unstructured":"Wang R, Zhang J, Song SH, Letaief KB (2016) Optimal qos-aware channel assignment in d2d communications with partial csi. IEEE Trans Wirel Commun 15(11):7594\u20137609","journal-title":"IEEE Trans Wirel Commun"},{"issue":"6","key":"1265_CR45","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1109\/LCOMM.2016.2552171","volume":"20","author":"X Xu","year":"2016","unstructured":"Xu X, Zhang Y, Sun Z, Hong Y, Tao X (2016) Analytical modeling of mode selection for moving d2d-enabled cellular networks. IEEE Commun Lett 20(6):1203\u20131206","journal-title":"IEEE Commun Lett"},{"key":"1265_CR46","doi-asserted-by":"crossref","unstructured":"Zhang S, Peng Y (2020) D2d communication relay selection algorithm based on game theory. Procedia Computer Science 166:563\u2013569. Proceedings of the 3rd International Conference on Mechatronics and Intelligent Robotics (ICMIR-2019)","DOI":"10.1016\/j.procs.2020.02.020"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01265-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01265-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01265-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T08:19:10Z","timestamp":1647418750000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01265-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,19]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1265"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01265-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,1,19]]},"assertion":[{"value":"23 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not include any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}