{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:56:25Z","timestamp":1742640985715,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infocom.2019.8737657","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:35:56Z","timestamp":1560818156000},"page":"1396-1404","source":"Crossref","is-referenced-by-count":19,"title":["A Collaborative Learning Based Approach for Parameter Configuration of Cellular Networks"],"prefix":"10.1109","author":[{"given":"Jie","family":"Chuai","sequence":"first","affiliation":[]},{"given":"Zhitang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guochen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xueying","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xiaoxiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chongming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Feiyi","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"A survey of Partial Least Squares (PLS) methods, with emphasis on the two-block case","year":"2000","author":"wegelin et al","key":"ref38"},{"key":"ref33","first-page":"63","article-title":"Gaussian processes in machine learning","author":"rasmussen","year":"2004","journal-title":"Advanced Lectures on Machine Learning"},{"key":"ref32","first-page":"649","article-title":"Double Thompson Sampling for dueling bandits","author":"wu","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref31","first-page":"39","article-title":"Analysis of Thompson Sampling for the multi-armed bandit problem","author":"agrawal","year":"2012","journal-title":"Conference on Learning Theory"},{"key":"ref30","article-title":"Finite-time analysis of kernelised contextual bandits","author":"valko","year":"2013","journal-title":"arXiv preprint arXiv 1309 6869"},{"key":"ref37","first-page":"41","article-title":"Multi-task feature learning","author":"argyriou","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5437-0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1982.268295"},{"journal-title":"Learning With Kernels Support Vector Machines Regularization Optimization and Beyond","year":"2002","author":"sch\u00f6lkopf","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258058"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846723"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref14","first-page":"2249","article-title":"An empirical evaluation of Thompson Sampling","author":"chapelle","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref15","first-page":"208","article-title":"Contextual bandits with linear payoff functions","author":"chu","year":"2011","journal-title":"AISTATS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195483"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248814"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218417"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2091281"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MicroCom.2016.7522429"},{"key":"ref27","first-page":"677","article-title":"Transfer learning via dimensionality reduction","volume":"8","author":"pan","year":"2008","journal-title":"AAAI"},{"key":"ref3","first-page":"1915","article-title":"A network controlled handover mechanism and its optimization in LTE heterogeneous networks","author":"guohua","year":"2013","journal-title":"IEEE Wireless Communications and Networking Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1500295NM"},{"key":"ref29","article-title":"Gaussian process optimization in the bandit setting: no regret and experimental design","author":"srinivas","year":"2009","journal-title":"arXiv preprint arXiv 0912 3995"},{"journal-title":"Evolved Universal Terrestrial Radio Access (E-UTRA) Radio Resource Control (RRC) Protocol Specification","year":"2016","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2782726"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316162750.008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6146489"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2393496"},{"journal-title":"4G LTE\/LTE-Advanced for Mobile Broadband","year":"2013","author":"dahlman","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422661"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647564"},{"key":"ref24","first-page":"1541","article-title":"Heterogeneous domain adaptation using manifold alignment","volume":"22","author":"wang","year":"2011","journal-title":"International Joint Conference on Artificial Intelligence"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/2382577.2382582","article-title":"Multisource domain adaptation and its application to early detection of fatigue","volume":"6","author":"chattopadhyay","year":"2012","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"ref25","article-title":"Learning with augmented features for heterogeneous domain adaptation","author":"duan","year":"2012","journal-title":"arXiv preprint arXiv 1206 4660"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","start":{"date-parts":[[2019,4,29]]},"location":"Paris, France","end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8732929\/8737365\/08737657.pdf?arnumber=8737657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:15:02Z","timestamp":1657854902000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8737657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/infocom.2019.8737657","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}