{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:28:10Z","timestamp":1775179690549,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796961","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"1199-1208","source":"Crossref","is-referenced-by-count":79,"title":["Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach"],"prefix":"10.1109","author":[{"given":"Xiong","family":"Wang","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology,National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology,Wuhan,China"}]},{"given":"Jiancheng","family":"Ye","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd,Network Technology Lab and Hong Kong Research Center,Hong Kong"}]},{"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Computer Science and Engineering,Hong Kong"}]}],"member":"263","reference":[{"key":"ref33","article-title":"Fair Algorithms for Multi-Agent Multi-Armed Bandits","author":"hossain","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737461"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864425"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2780834"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796961"},{"key":"ref10","article-title":"Distributed Multi-Player Bandits-a Game of Thrones Approach","author":"bistritz","year":"2018","journal-title":"Proc NeurIPS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933966"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2934003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2478718"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500486"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.06.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737653"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2635380"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF02216923"},{"key":"ref19","first-page":"930","article-title":"My Fair Bandit: Distributed Learning of Max-Min Fairness with Multi-player Bandits","author":"bistritz","year":"2020","journal-title":"Proc ICML"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3136095"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486305"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3404397.3404417"},{"key":"ref5","first-page":"1","article-title":"Online Cooperative Resource Allocation at the Edge: A Privacy-Preserving Approach","author":"li","year":"2021","journal-title":"Proc IEEE ICNP"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737560"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760160"},{"key":"ref2","article-title":"Internet of Things Data to Top 1.6 Zettabytes by 2020","author":"kelly","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737654"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2285512"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485914"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080106"},{"key":"ref24","article-title":"4G Speed Tests","year":"0"},{"key":"ref23","author":"neapolitan","year":"2004","journal-title":"Foundations of Algorithms Using C++ Pseudocode"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796961.pdf?arnumber=9796961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:46:34Z","timestamp":1658177194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796961","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}