{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T19:08:36Z","timestamp":1732043316149,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001691","name":"JSPS","doi-asserted-by":"publisher","award":["JP21K14162,JP22H03649"],"award-info":[{"award-number":["JP21K14162,JP22H03649"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2210252"],"award-info":[{"award-number":["2210252"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10437383","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:45:36Z","timestamp":1708976736000},"page":"6880-6885","source":"Crossref","is-referenced-by-count":1,"title":["A Dual-Objective Bandit-Based Opportunistic Band Selection Strategy for Hybrid-Band V2X Metaverse Content Update"],"prefix":"10.1109","author":[{"given":"Sherief","family":"Hashima","sequence":"first","affiliation":[{"name":"RIKEN-AIP,Computational Learning Theory Team,Fukuoka,Japan"}]},{"given":"Zubair Md","family":"Fadlullah","sequence":"additional","affiliation":[{"name":"Western University,Department of Computer Science,London,ON,Canada"}]},{"given":"Mostafa M.","family":"Fouda","sequence":"additional","affiliation":[{"name":"Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA"}]},{"given":"Kohei","family":"Hatano","sequence":"additional","affiliation":[{"name":"RIKEN-AIP,Computational Learning Theory Team,Fukuoka,Japan"}]},{"given":"Eiji","family":"Takimoto","sequence":"additional","affiliation":[{"name":"Kyushu University,Department of Informatics,Fukuoka,Japan"}]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI),Machine Learning Department,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC55196.2022.9952976"},{"key":"ref2","volume":"abs\/2210.15109","author":"Zhou","year":"2022","journal-title":"Vetaverse: A survey on the intersection of metaverse, vehicles, and transportation systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3162135"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3229021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000839"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037408"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950778"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908872"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2023.3244871"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3003786"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032516"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685996"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3163078"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04475-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11111782"},{"key":"ref16","article-title":"Multi-armed bandits with cost subsidy","volume-title":"Proceedings of The 24th International Conference on Artificial Intelligence and Statistics","author":"Sinha","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892238"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref19","article-title":"Minimax policies for adversarial and stochastic bandits","volume-title":"Proceedings of the 22nd Annual Conference on Learning Theory (COLT)","author":"Audibert","year":"2009"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","start":{"date-parts":[[2023,12,4]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10437383.pdf?arnumber=10437383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T01:27:29Z","timestamp":1709256449000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10437383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10437383","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}