{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:41:23Z","timestamp":1730295683145,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/secon52354.2021.9491597","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T01:28:27Z","timestamp":1627349307000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["CORE: Connectivity Optimization via REinforcement Learning in WANETs"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Gorovits","sequence":"first","affiliation":[]},{"given":"Karyn","family":"Doke","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mariya","family":"Zheleva","sequence":"additional","affiliation":[]},{"given":"Petko","family":"Bogdanov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"2210","article-title":"Budgeted multi-armed bandits with multiple plays","author":"xia","year":"2016","journal-title":"IJCAI"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2901897"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2016.2631518"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COASE.2008.4626424"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1126\/science.1177170"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248394"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513033"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0147299"},{"article-title":"Knapsack based optimal policies for budget-limited multi-armed bandits","year":"2012","author":"tran-thanh","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3347146.3359100"},{"article-title":"CRAWDAD dataset yonsei\/lifemap (v. 2012-01-03)","year":"2012","author":"chon","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112846"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2465529.2466586"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1851322.1851330"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.02.011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00047"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622481"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1977.1093714"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415607"},{"article-title":"Options discovery with budgeted reinforcement learning","year":"2016","author":"l\u00e9on","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220110"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2011.12.008"},{"key":"ref4","article-title":"A survey on trajectory clustering analysis","volume":"abs 1802 6971","author":"bian","year":"2018","journal-title":"CoRR"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-024-0917-8_12"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3264844.3264845"},{"key":"ref6","article-title":"Budgeted reinforcement learning in continuous state space","author":"carrara","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0139931"},{"article-title":"A survey on trajectory clustering analysis","year":"2018","author":"bian","key":"ref5"},{"key":"ref8","article-title":"Distributive dynamic spectrum access through deep reinforcement learning: A reservoir computing-based approach","author":"chang","year":"2018","journal-title":"IEEE IoT Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/2683386"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2876823"},{"key":"ref1","article-title":"Tweeting&#x2019;when online is off&#x2019;? opportunistically creating mobile ad-hoc networks in response to disrupted infrastructure","author":"al-akkad","year":"2014","journal-title":"IEEE ISCRAM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523548"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2011.30"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2616034"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2743025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2944147"},{"key":"ref41","article-title":"Kwiizya: Local cellular network services in remote areas","author":"zheleva","year":"2013","journal-title":"ACM MobiSys13"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/srep02923"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195503"},{"key":"ref25","article-title":"Codeblue: An ad hoc sensor network infrastructure for emergency medical care","author":"malan","year":"2004","journal-title":"IEEE BSN2004"}],"event":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","start":{"date-parts":[[2021,7,6]]},"location":"Rome, Italy","end":{"date-parts":[[2021,7,9]]}},"container-title":["2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9491576\/9491577\/09491597.pdf?arnumber=9491597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:48Z","timestamp":1652197428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9491597\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/secon52354.2021.9491597","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}