{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:22:53Z","timestamp":1759332173145,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621161","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"431-440","source":"Crossref","is-referenced-by-count":4,"title":["Learning-based Scheduling for Information Gathering with QoS Constraints"],"prefix":"10.1109","author":[{"given":"Qingsong","family":"Liu","sequence":"first","affiliation":[{"name":"Tsinghua University,IIIS,Beijing,China"}]},{"given":"Weihang","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Washington,USA"}]},{"given":"Zhixuan","family":"Fang","sequence":"additional","affiliation":[{"name":"Tsinghua University,IIIS,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2019.1840"},{"key":"ref2","first-page":"9256","article-title":"Linear stochastic bandits under safety constraints","volume":"32","author":"Amani","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600425"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3025630"},{"key":"ref6","article-title":"Combinatorial semi-bandit in the non-stationary environment","author":"Chen","year":"2021","journal-title":"Uncertainty in Artificial Intelligence"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/3319502.3374806","article-title":"Multi-armed bandits with fairness constraints for distributing resources to human teammates","volume-title":"Proceedings of the 2020 ACM\/IEEE International Conference on Human-Robot Interaction","author":"Claure"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2008.041164"},{"journal-title":"A new look at fairness in stochastic multi-armed bandit problems","year":"2021","author":"Fang","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163054"},{"article-title":"Rectified pessimistic-optimistic learning for stochastic continuum-armed bandit with constraints","volume-title":"Learning for Dynamics and Control Conference","author":"Guo","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737610"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845089"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530772"},{"article-title":"Thompson sampling for combinatorial semi-bandits with sleeping arms and long-term fairness constraints","year":"2020","author":"Huang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486307"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00440-008-0158-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488709"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2954310"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/fi13070174"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228901"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i12.29306"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2021.102240"},{"journal-title":"Advances in Neural Information Processing Systems","article-title":"Combinatorial bandits with linear constraints: Beyond knapsacks and fairness","author":"Liu","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488781"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00401-2"},{"key":"ref27","article-title":"An efficient pessimistic-optimistic algorithm for stochastic linear bandits with general constraints","author":"Liu","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3032237"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3124949"},{"article-title":"Stochastic bandits with linear constraints","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Pacchiano","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3466772.3467040"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5986"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155490"},{"article-title":"Constrained thompson sampling for wireless link optimization","year":"2019","author":"Saxena","key":"ref34"},{"article-title":"A bayesian approach for stochastic continuum-armed bandit with long-term constraints","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Shi","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796683"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3224431"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919842"},{"key":"ref39","first-page":"4300","article-title":"Non-stationary reinforcement learning without prior knowledge: An optimal black-box approach","volume-title":"Conference on learning theory","author":"Wei"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20302"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/354"},{"article-title":"Constrained efficient global optimization of expensive black-box functions","volume-title":"International Conference on Machine Learning","author":"Xu","key":"ref42"},{"key":"ref43","article-title":"On kernelized multi-armed bandits with constraints","author":"Zhou","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref44","first-page":"7683","article-title":"Beating stochastic and adversarial semi-bandits optimally and simultaneously","volume-title":"International Conference on Machine Learning","author":"Zimmert"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","start":{"date-parts":[[2024,5,20]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621161.pdf?arnumber=10621161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:24:10Z","timestamp":1723526650000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621161","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}