{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:08:56Z","timestamp":1730200136550,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006449","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"1517-1526","source":"Crossref","is-referenced-by-count":4,"title":["Kernel-based Multi-Task Contextual Bandits in Cellular Network Configuration"],"prefix":"10.1109","author":[{"given":"Xiaoxiao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xueying","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Chuai","sequence":"additional","affiliation":[]},{"given":"Zhitang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"817","article-title":"The epoch-greedy algorithm for multiarmed bandits with side information","author":"langford","year":"2008","journal-title":"Advances in neural information processing systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1145\/1772690.1772758","article-title":"A contextual-bandit approach to personalized news article recommendation","author":"li","year":"2010","journal-title":"Proceedings of the 19th International Conference on World Wide Web"},{"key":"ref13","article-title":"Finite-time analysis of kernelised contextual bandits","author":"valko","year":"2013","journal-title":"arXiv preprint arXiv 1309 6869"},{"key":"ref14","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration tradeoffs","volume":"3","author":"auer","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1214\/14-STS504"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014067"},{"key":"ref17","first-page":"153","article-title":"Multi-task gaussian process prediction","author":"bonilla","year":"2008","journal-title":"Advances in neural information processing systems"},{"key":"ref18","first-page":"43","article-title":"Kernel multitask learning using task-specific features","author":"bonilla","year":"2007","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref19","first-page":"4851","article-title":"Multi-task learning for contextual bandits","author":"deshmukh","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502072"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2002.1045261"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2011.6139947"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2520221"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2798164"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258058"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2012.6215400"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2393496"},{"journal-title":"Cisco Visual Networking Index Global mobile data traffic forecast update 2014-2019","year":"2015","author":"index","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/BF02985802","article-title":"The elements of statistical learning: data mining, inference and prediction","volume":"27","author":"hastie","year":"2005","journal-title":"The Mathematical Intelligencer"},{"journal-title":"Gaussian Processes for Machine Learning","year":"2006","author":"rasmussen","key":"ref24"},{"key":"ref23","volume":"4","author":"zhang","year":"2006","journal-title":"The Schur Complement and Its Applications"},{"key":"ref26","first-page":"2447","article-title":"Contextual gaussian process bandit optimization","author":"krause","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75225-7_5"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006449.pdf?arnumber=9006449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:13Z","timestamp":1658080393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006449","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}