{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:36:26Z","timestamp":1773801386952,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Wallenberg AI, Autonomous Systems and Software Program"},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tmc.2024.3424192","type":"journal-article","created":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:22:51Z","timestamp":1720200171000},"page":"12666-12679","source":"Crossref","is-referenced-by-count":4,"title":["Learning Optimal Antenna Tilt Control Policies: A Contextual Linear Bandits Approach"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7668-0650","authenticated-orcid":false,"given":"Filippo","family":"Vannella","sequence":"first","affiliation":[{"name":"Ericsson Research, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4679-4673","authenticated-orcid":false,"given":"Alexandre","family":"Proutiere","sequence":"additional","affiliation":[{"name":"Division of Decision and Control Systems, KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4403-1066","authenticated-orcid":false,"given":"Yassir","family":"Jedra","sequence":"additional","affiliation":[{"name":"Laboratory for Information and Decision Systems, MIT, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4533-3418","authenticated-orcid":false,"given":"Jaeseong","family":"Jeong","sequence":"additional","affiliation":[{"name":"Ericsson Research, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796783"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119961789.ch3"},{"key":"ref3","first-page":"817","article-title":"The epoch-greedy algorithm for multi-armed bandits with side information","volume-title":"Proc. 20th Int. Conf. Neural Inf. Process. Syst.","author":"Langford"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2605380"},{"key":"ref6","article-title":"Sequential resource allocation in linear stochastic bandits","author":"Soare","year":"2015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/07474946.2021.1847965"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2017.0928"},{"key":"ref10","first-page":"1:1","article-title":"On the complexity of best-arm identification in multi-armed bandit models","volume":"17","author":"Kaufmann","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref11","first-page":"998","article-title":"Optimal best arm identification with fixed confidence","volume-title":"Proc. 29th Annu. Conf. Learn. Theory","author":"Garivier"},{"key":"ref12","article-title":"Sequential experimental design for transductive linear bandits","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Fiez"},{"key":"ref13","article-title":"Optimal best-arm identification in linear bandits","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Jedra"},{"key":"ref14","first-page":"2312","article-title":"Improved algorithms for linear stochastic bandits","volume-title":"Proc. 24th Int. Conf. Neural Inf. Process. Syst.","author":"Abbasi-Yadkori"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0385"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/9781009489843"},{"key":"ref17","article-title":"The role of contextual information in best arm identification","author":"Kato","year":"2021"},{"key":"ref18","first-page":"208","article-title":"Contextual bandits with linear payoff functions","volume-title":"Proc. 14th Int. Conf. Artif. Intell. Statist.","author":"Chu"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref20","first-page":"3536","article-title":"Adaptive exploration in linear contextual bandit","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Statist.","author":"Hao"},{"key":"ref21","first-page":"2432","article-title":"Gamification of pure exploration for linear bandits","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Degenne"},{"key":"ref22","article-title":"Design of experiments for stochastic contextual linear bandits","volume-title":"Proc. 35th Int. Conf. Neural Inf. Process. Syst.","author":"Zanette"},{"key":"ref23","first-page":"37590","article-title":"Instance-optimal PAC algorithms for contextual bandits","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Li","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2000.851276"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC.2002.1088276"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2011.5956370"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2294965"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033325"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0742-x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3849-9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288237"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554660"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2933420"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417363"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC50174.2021.9569387"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414155"},{"key":"ref39","article-title":"Coordinated reinforcement learning in mobile networks","volume-title":"Proc. NeurIPS Workshop Cooperative AI","author":"Bouton"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348456"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3202041"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5493665"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2013.2276414"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2798164"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02199-3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3000189"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2919016"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448999"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1960-030-4"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmaa.2013.12.011"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176988477"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10746253\/10587126.pdf?arnumber=10587126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:31:31Z","timestamp":1732667491000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10587126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":52,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3424192","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}