{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:15:03Z","timestamp":1769840103401,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621364","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"371-380","source":"Crossref","is-referenced-by-count":8,"title":["Adversarial Combinatorial Bandits with Switching Cost and Arm Selection Constraints"],"prefix":"10.1109","author":[{"given":"Yin","family":"Huang","sequence":"first","affiliation":[{"name":"University of Miami,Department of Electrical and Computer Engineering"}]},{"given":"Qingsong","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute for Interdisciplinary Information Sciences, Tsinghua University"}]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Miami,Department of Electrical and Computer Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i17.17775"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1214\/14-STS504"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933764"},{"key":"ref5","article-title":"Minimal exploration in structured stochastic bandits","volume":"30","author":"Combes","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/9.7243"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2954310"},{"key":"ref8","first-page":"7683","article-title":"Beating stochastic and adversarial semi-bandits optimally and simultaneously","volume-title":"International Conference on Machine Learning","author":"Zimmert"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228986"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref12","first-page":"42","article-title":"The best of both worlds: Stochastic and adversarial bandits","volume-title":"Conference on Learning Theory. JMLR Workshop and Conference Proceedings","author":"Bubeck"},{"key":"ref13","first-page":"1287","article-title":"One practical algorithm for both stochastic and adversarial bandits","volume-title":"International Conference on Machine Learning","author":"Seldin"},{"key":"ref14","first-page":"116","article-title":"An algorithm with nearly optimal pseudoregret for both stochastic and adversarial bandits","volume-title":"Conference on Learning Theory","author":"Auer"},{"key":"ref15","first-page":"1743","article-title":"An improved parametrization and analysis of the exp3++ algorithm for stochastic and adversarial bandits","volume-title":"Conference on Learning Theory","author":"Seldin"},{"key":"ref16","first-page":"467","article-title":"An optimal algorithm for stochastic and adversarial bandits","volume-title":"The 22nd International Conference on Artificial Intelligence and Statistics","author":"Zimmert"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2013.0598"},{"key":"ref18","article-title":"First-order regret bounds for combinatorial semi-bandits","author":"Neu","year":"2015","journal-title":"Eprint Arxiv"},{"key":"ref19","article-title":"Combinatorial bandits revisited","volume":"28","author":"Combes","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40935-6_17"},{"key":"ref21","article-title":"More adaptive algorithms for adversarial bandits","author":"Wei","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591868"},{"key":"ref23","first-page":"9127","article-title":"An algorithm for stochastic and adversarial bandits with switching costs","volume-title":"International Conference on Machine Learning","author":"Rouyer"},{"key":"ref24","first-page":"15800","article-title":"Better best of both worlds bounds for bandits with switching costs","volume":"35","author":"Amir","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/9.486316"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348135"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3040887"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771884"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072115"},{"key":"ref30","volume-title":"Stochastic network optimization with application to communication and queueing systems.","author":"Neely","year":"2022"},{"key":"ref31","first-page":"24075","article-title":"An efficient pessimistic-optimistic algorithm for stochastic linear bandits with general constraints","volume":"34","author":"Liu","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref32","first-page":"14","article-title":"On kernelized multi-armed bandits with constraints","volume":"35","author":"Zhou","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/WiOpt56218.2022.9930591"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2869874"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737401"},{"key":"ref36","article-title":"Convex analysis and optimization","author":"Bertsekas","year":"2003","journal-title":"Pitman Advanced Pub. Program"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","location":"Vancouver, BC, Canada","start":{"date-parts":[[2024,5,20]]},"end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621364.pdf?arnumber=10621364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:46:47Z","timestamp":1723528007000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621364\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621364","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}