{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:33:59Z","timestamp":1725680039839},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icassp.2019.8682398","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T20:01:56Z","timestamp":1555531316000},"page":"4524-4528","source":"Crossref","is-referenced-by-count":5,"title":["Online Learning for Computation Peer Offloading with Semi-bandit Feedback"],"prefix":"10.1109","author":[{"given":"Hongbin","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Kai","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Xiliang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TWC.2017.2717986"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICC.2017.7996574"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/COMST.2017.2745201"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/GlobalSIP.2018.8646562"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/JIOT.2016.2584538"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1561\/2400000013"},{"key":"ref16","first-page":"151","article-title":"Combinatorial multi-armed bandit: General framework and applications","author":"chen","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TNET.2018.2841758"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-319-05029-4_7"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TCOMM.2017.2699660"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/GLOCOM.2016.7841937"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/JSAC.2015.2478718"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TWC.2016.2633522"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2677046.2677052"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2342509.2342513"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/JSAC.2016.2624118"}],"event":{"name":"ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2019,5,12]]},"location":"Brighton, United Kingdom","end":{"date-parts":[[2019,5,17]]}},"container-title":["ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8671773\/8682151\/08682398.pdf?arnumber=8682398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:14:54Z","timestamp":1657854894000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8682398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icassp.2019.8682398","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}