{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:21:34Z","timestamp":1740133294107,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["SRG\/2021\/00230"],"award-info":[{"award-number":["SRG\/2021\/00230"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Grant","award":["USDA-020-67021-32855","NSF OIA-2134901"],"award-info":[{"award-number":["USDA-020-67021-32855","NSF OIA-2134901"]}]},{"name":"NSF","award":["CNS-2312836","CNS-2223452","CNS-2225561","CNS-2112471","CNS-2106933"],"award-info":[{"award-number":["CNS-2312836","CNS-2223452","CNS-2225561","CNS-2112471","CNS-2106933"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tnet.2024.3422323","type":"journal-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:56:23Z","timestamp":1720461383000},"page":"4222-4237","source":"Crossref","is-referenced-by-count":0,"title":["Linear Bandits With Side Observations on Networks"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6532-9208","authenticated-orcid":false,"given":"Avik","family":"Kar","sequence":"first","affiliation":[{"name":"Department of ECE, Indian Institute of Science Bengaluru, Bengaluru, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0363-3666","authenticated-orcid":false,"given":"Rahul","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of ECE, Indian Institute of Science Bengaluru, Bengaluru, Karnataka, India"}]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[{"name":"Facebook, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5379-8269","authenticated-orcid":false,"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California at Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4606-6879","authenticated-orcid":false,"given":"Ness B.","family":"Shroff","sequence":"additional","affiliation":[{"name":"Department of ECE, The Ohio State University, Columbus, OH, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer","year":"2002","journal-title":"J. Mach. Learn. Res."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref3","first-page":"817","article-title":"The epoch-greedy algorithm for multi-armed bandits with side information","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Langford"},{"key":"ref4","first-page":"728","article-title":"The end of optimism? An asymptotic analysis of finite-armed linear bandits","volume-title":"Proc. Artif. Intell. Statist.","author":"Lattimore"},{"volume-title":"Facebook","year":"2020","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339540"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623672"},{"key":"ref8","first-page":"142","article-title":"Leveraging side observations in stochastic bandits","volume-title":"Proc. 28th Conf. Uncertainty Artif. Intell.","author":"Caron"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591989"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/srep06308"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17142-5_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref16","first-page":"208","article-title":"Contextual bandits with linear payoff functions","volume-title":"Proc. 14th Int. Conf. Artif. Intell. Statist.","author":"Chu"},{"key":"ref17","first-page":"2249","article-title":"An empirical evaluation of Thompson sampling","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chapelle"},{"key":"ref18","first-page":"127","article-title":"Thompson sampling for contextual bandits with linear payoffs","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Agrawal"},{"key":"ref19","first-page":"1","article-title":"Analysis of Thompson sampling for the multi-armed bandit problem","volume-title":"Proc. 25th Conf. Learn. Theory","author":"Agrawal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1561\/9781680834710"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16961"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1982.1102878"},{"key":"ref23","first-page":"6248","article-title":"Exploration through reward biasing: Reward-biased maximum likelihood estimation for stochastic multi-armed bandits","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu"},{"key":"ref24","first-page":"815","article-title":"Reward biased maximum likelihood estimation for reinforcement learning","volume-title":"Proc. Learn. Dyn. Control","author":"Mete"},{"key":"ref25","first-page":"679","article-title":"Contextual bandits with similarity information","volume-title":"Proc. 24th Annu. Conf. Learn. Theory","author":"Slivkins"},{"key":"ref26","first-page":"2776","article-title":"Semiparametric contextual bandits","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Krishnamurthy"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1100.0446"},{"key":"ref28","first-page":"2312","article-title":"Improved algorithms for linear stochastic bandits","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"24","author":"Abbasi-Yadkori"},{"key":"ref29","first-page":"684","article-title":"From bandits to experts: On the value of side-observations","volume-title":"Proc. NIPS","author":"Mannor"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/140989455"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref32","first-page":"216:1","article-title":"Reward maximization under uncertainty: Leveraging side-observations on networks","volume":"18","author":"Buccapatnam","year":"2017","journal-title":"J. Mach. Learn. Res."},{"key":"ref33","first-page":"811","article-title":"Online learning with feedback graphs without the graphs","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Cohen"},{"key":"ref34","first-page":"23","article-title":"Online learning with feedback graphs: Beyond bandits","volume-title":"Proc. Conf. Learn. Theory","author":"Alon"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798264"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2852361"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619744"},{"key":"ref38","first-page":"4529","article-title":"Decentralized cooperative stochastic bandits","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Mart\u00ednez-Rubio"},{"key":"ref39","first-page":"8885","article-title":"Cooperative stochastic bandits with asynchronous agents and constrained feedback","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Yang"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796901"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3570614"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3366701"},{"key":"ref43","first-page":"3471","article-title":"The gossiping insert-eliminate algorithm for multi-agent bandits","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Chawla"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012593"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492541"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2299517"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.29"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007367"},{"key":"ref49","first-page":"355","article-title":"Stochastic linear optimization under bandit feedback","volume-title":"Proc. 21st Annu. Conf. Learn. Theory","author":"Dani"},{"volume-title":"Real Analysis: Modern Techniques and Their Applications","year":"2013","author":"Folland","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2015.0202"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/90\/10720541\/10589477-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/90\/10720541\/10589477.pdf?arnumber=10589477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T04:34:50Z","timestamp":1729226090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10589477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":51,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3422323","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}