{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:06:49Z","timestamp":1775228809173,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008629","name":"Info-communications Media Development Authority","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008629","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tmc.2024.3370101","type":"journal-article","created":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T19:32:09Z","timestamp":1709062329000},"page":"9881-9897","source":"Crossref","is-referenced-by-count":21,"title":["Age-Based Scheduling for Mobile Edge Computing: A Deep Reinforcement Learning Approach"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0582-2287","authenticated-orcid":false,"given":"Xingqiu","family":"He","sequence":"first","affiliation":[{"name":"Intelligent Networking and Computing Research Center and School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3495-7305","authenticated-orcid":false,"given":"Chaoqun","family":"You","sequence":"additional","affiliation":[{"name":"Intelligent Networking and Computing Research Center and School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4037-3149","authenticated-orcid":false,"given":"Tony Q. S.","family":"Quek","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.10.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.10.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195689"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984917"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/1300000060"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7283009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9048933"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445909"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406909"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2012.6310931"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875100"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3002994"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3033501"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2533395"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2871079"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406928"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852321"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406945"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2019.8902529"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3064055"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3192098"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3341082"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3053937"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2947419"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2023.3329017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3051163"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986615"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3242997"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2933417"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2897134"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2023.3328614"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3283287"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3261338"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3312130"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2785305"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911455"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2599530"},{"key":"ref40","volume-title":"Digital Integrated Circuits: A Design Perspective","volume":"7","author":"Rabaey","year":"2003"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/4.126534"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2959300"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2932995"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2964765"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"issue":"4","key":"ref46","first-page":"1563","article-title":"Near-optimal regret bounds for reinforcement learning","volume":"11","author":"Jaksch","year":"2010","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"ref47","first-page":"1","article-title":"Learning rates for Q-learning","volume":"5","author":"Even-Dar","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080514"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.36"},{"issue":"2","key":"ref50","first-page":"3","article-title":"Towards a unified theory of state abstraction for MDPs","volume":"1","author":"Li","year":"2006","journal-title":"AI&M"},{"key":"ref51","article-title":"Queue stability and probability 1 convergence via lyapunov optimization","author":"Neely","year":"2010"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1201\/9781315140223"},{"key":"ref53","volume-title":"Dynamic Programming and Optimal Control: Vol. 1","author":"Bertsekas","year":"2000"},{"key":"ref54","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-307-3.50045-9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796654"},{"key":"ref57","article-title":"Playing Atari with deep reinforcement learning","author":"Mnih","year":"2013"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.32657\/10356\/90191"},{"key":"ref59","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mnih"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00815-1"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3093352"},{"key":"ref62","article-title":"Discounted reinforcement learning is not an optimization problem","author":"Naik","year":"2019"},{"key":"ref63","first-page":"387","article-title":"Deterministic policy gradient algorithms","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Silver"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488598000094"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/23.589532"},{"key":"ref66","article-title":"Estimating training compute of deep learning models","author":"Sevilla","year":"2022"},{"key":"ref67","article-title":"H100 tensor core GPU architecture overview","year":"2022"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.112513.130760"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2990630"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2917890"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10663873\/10449431.pdf?arnumber=10449431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T19:29:14Z","timestamp":1725650954000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10449431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":70,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3370101","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}