{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:34:56Z","timestamp":1770917696127,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/infcom.2011.5934892","type":"proceedings-article","created":{"date-parts":[[2011,7,7]],"date-time":"2011-07-07T14:59:10Z","timestamp":1310050750000},"page":"1152-1160","source":"Crossref","is-referenced-by-count":36,"title":["Sequential learning for optimal monitoring of multi-channel wireless networks"],"prefix":"10.1109","author":[{"given":"Pallavi","family":"Arora","sequence":"first","affiliation":[]},{"given":"Csaba","family":"Szepesvari","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"72","article-title":"Maximum coverage problem with group budget constraints and applications","author":"chekuri","year":"2004","journal-title":"APPROX"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1860093.1860109"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/1427934"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1100.0446"},{"key":"ref14","first-page":"355","article-title":"Stochastic linear optimization under bandit feedback","author":"dani","year":"2008","journal-title":"COLT-2008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1060.0206"},{"key":"ref16","article-title":"Cognitive medium access: Exploration, exploitation and competition","volume":"abs 710 1385","author":"lai","year":"2007","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2008.5074370"},{"key":"ref18","article-title":"Decentralized multi-armed bandit with multiple distributed players","volume":"abs 910 2065","author":"liu","year":"2009","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462144"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/9.7243"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/511399.511359","article-title":"Characterizing user behavior and network performance in a public wireless LAN","volume":"30","author":"balachandran","year":"2002","journal-title":"SIGMETRICS Perform Eval Rev"},{"key":"ref27","article-title":"Combinatorial bandits","author":"cesa-bianchi","year":"2009","journal-title":"COLT 2009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023660"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/1023720.1023739","article-title":"The changing usage of a mature campus-wide wireless network","author":"henderson","year":"2004","journal-title":"Mobicom"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159920"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1080148.1080150"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530780"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457883"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1987.1104491"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/844128.844143","article-title":"Fine-grained network time synchronization using reference broadcasts","volume":"36","author":"elson","year":"2002","journal-title":"SIGOPS Oper Syst Rev"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.01.016"},{"key":"ref23","first-page":"150","article-title":"Tuning bandit algorithms in stochastic environments","author":"audibert","year":"2007","journal-title":"Algorithmic Learning Theory - 18th International Conference ALT 2007"},{"key":"ref26","article-title":"On upper-confidence bound policies for non-stationary bandit problems","author":"garivier","year":"2008","journal-title":"Tech Rep"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892116"}],"event":{"name":"IEEE INFOCOM 2011 - IEEE Conference on Computer Communications","location":"Shanghai, China","start":{"date-parts":[[2011,4,10]]},"end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5888673\/5934870\/05934892.pdf?arnumber=5934892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:20:52Z","timestamp":1741306852000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5934892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infcom.2011.5934892","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}