{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:49:00Z","timestamp":1774374540412,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621359","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"1401-1410","source":"Crossref","is-referenced-by-count":15,"title":["Quantum BGP with Online Path Selection via Network Benchmarking"],"prefix":"10.1109","author":[{"given":"Maoli","family":"Liu","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Zhuohua","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Kechao","family":"Cai","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University"}]},{"given":"Jonathan","family":"Allcock","sequence":"additional","affiliation":[{"name":"Tencent Quantum Laboratory"}]},{"given":"Shengyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tencent Quantum Laboratory"}]},{"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref2","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume-title":"Proceedings of the International Conference on Computers, Systems & Signal Processing","author":"Bennett"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.59.4249"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1119\/1.1463744"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.70.1895"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863982"},{"issue":"9","key":"ref8","first-page":"575","article-title":"Field experiment on a","volume":"21","author":"Chen","year":"2009","journal-title":"IEEE Photonics Technology Letters"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1364\/OE.22.021739"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/9781420026603.ch4"},{"key":"ref11","first-page":"4287","article-title":"\"event- ready-detectors","volume":"71","author":"ukowski","year":"1993","journal-title":"bell experiment via entanglement swapping,\" Phys. Rev. Lett."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.022310"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-019-0139-x"},{"key":"ref14","article-title":"Distributed routing in a quantum internet","author":"Chakraborty","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2020.3028172"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405853"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-020-00344-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796816"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796814"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3200115"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(02)01272-0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/QCE53715.2022.00064"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-022-00628-x"},{"key":"ref24","first-page":"258","article-title":"Multiple identifications in multi-armed bandits","volume-title":"International Conference on Machine Learning","author":"Bubeck"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.47.777"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2328","article-title":"OSPF Version 2","volume-title":"Internet Engineering Task Force, Request for Comments RFC 2328","author":"Moy","year":"1998"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1058","article-title":"Routing Information Protocol","volume-title":"Internet Engineering Task Force, Request for Comments RFC 1058","author":"Hedrick","year":"1988"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.85.042311"},{"key":"ref29","article-title":"The heisenberg representation of quantum computers","author":"Gottesman","year":"1998"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-021-00647-8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.101003"},{"key":"ref32","article-title":"University of oregon route views project","year":"2023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3374888.3374899"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-019-0147-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2763325"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s13119-013-0026-2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431293"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.108.022418"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2200151"},{"issue":"6","key":"ref40","article-title":"Action elimination and stopping conditions for the multi-armed bandit and reinforcement learning problems","volume":"7","author":"Even-Dar","year":"2006","journal-title":"Journal of machine learning research"},{"issue":"Jun","key":"ref41","first-page":"623","article-title":"The sample complexity of exploration in the multi-armed bandit problem","volume":"5","author":"Mannor","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2014.6814096"},{"key":"ref43","first-page":"655","article-title":"Pac subset selection in stochastic multi-armed bandits","volume":"12","author":"Kalyanakrishnan","year":"2012","journal-title":"ICML"},{"key":"ref44","first-page":"1794","article-title":"The simulator: Understanding adaptive sampling in the moderate-confidence regime","volume-title":"Conference on Learning Theory","author":"Simchowitz"},{"key":"ref45","article-title":"Practical algorithms for best-k identification in multi-armed bandits","author":"Jiang","year":"2017"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","location":"Vancouver, BC, Canada","start":{"date-parts":[[2024,5,20]]},"end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621359.pdf?arnumber=10621359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:19:25Z","timestamp":1723526365000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621359\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621359","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}