{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:37:57Z","timestamp":1770748677179,"version":"3.50.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["SRG\/2022\/000069"],"award-info":[{"award-number":["SRG\/2022\/000069"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1109\/tcomm.2023.3305519","type":"journal-article","created":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T17:34:19Z","timestamp":1692120859000},"page":"6363-6376","source":"Crossref","is-referenced-by-count":1,"title":["Fast Change Identification in Multi-Play Bandits and its Applications in Wireless Networks"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8240-4038","authenticated-orcid":false,"given":"Gourab","family":"Ghatak","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology Delhi (IIT Delhi), New Delhi, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3093261"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3001388"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/2200000068"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9780470980033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40988-2_15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040957"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3171626"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2020.1795759"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3121653"},{"key":"ref11","first-page":"138","article-title":"Adaptively tracking the best bandit arm with an unknown number of distribution changes","volume-title":"Proc. 32nd Conf. Learn. Theory","author":"Auer"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394517"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2230215"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3113386"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2999075"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2966599"},{"key":"ref17","article-title":"On upper-confidence bound policies for non-stationary bandit problems","author":"Garivier","year":"2008","journal-title":"arXiv:0805.3415"},{"key":"ref18","article-title":"Taming non-stationary bandits: A Bayesian approach","author":"Raj","year":"2017","journal-title":"arXiv:1707.09727"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3004523"},{"key":"ref20","first-page":"442","article-title":"Thompson sampling in switching environments with Bayesian online change detection","volume-title":"Proc. Artif. Intell. Statist.","author":"Mellor"},{"key":"ref21","volume-title":"Multi-armed bandit, dynamic environments and meta-bandits","author":"Hartland","year":"2006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039462"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553524"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3022634"},{"key":"ref25","first-page":"418","article-title":"Nearly optimal adaptive procedure with change detection for piecewise-stationary bandit","volume-title":"Proc. 22nd Int. Conf. Artif. Intell. Statist.","author":"Cao"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1987.1104491"},{"key":"ref27","first-page":"2210","article-title":"Budgeted multi-armed bandits with multiple plays","volume-title":"Proc. IJCAI","volume":"6","author":"Xia"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3092767"},{"key":"ref29","first-page":"56","article-title":"Multi-player bandits revisited","volume-title":"Proc. Algorithmic Learn. Theory","author":"Besson"},{"key":"ref30","first-page":"23181","article-title":"Multiple-play stochastic bandits with shareable finite-capacity arms","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2931538"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3054854"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3118037"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2020.2981266"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292514"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCBDA49378.2020.9095689"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377343"},{"key":"ref38","first-page":"35","article-title":"The truncated normal distribution","volume":"1","author":"Burkardt","year":"2014"},{"key":"ref39","first-page":"1","article-title":"Analysis of Thompson sampling for the multi-armed bandit problem","volume-title":"Proc. 25th Conf. Learn. theory","author":"Agrawal"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3108955"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2331971"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2364267"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2813339"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/10321817\/10218337.pdf?arnumber=10218337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T19:24:23Z","timestamp":1709321063000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10218337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11]]},"references-count":44,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2023.3305519","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11]]}}}