{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:13:17Z","timestamp":1740132797921,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1817200"],"award-info":[{"award-number":["CCF-1817200"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ARO","award":["W911NF1910269"],"award-info":[{"award-number":["W911NF1910269"]}]},{"name":"Cisco Foundation","award":["1980393"],"award-info":[{"award-number":["1980393"]}]},{"name":"DOE","award":["DE-SC0021417"],"award-info":[{"award-number":["DE-SC0021417"]}]},{"DOI":"10.13039\/501100004359","name":"Vetenskapsr\u00e5det","doi-asserted-by":"publisher","award":["2018-04359"],"award-info":[{"award-number":["2018-04359"]}],"id":[{"id":"10.13039\/501100004359","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["CCF-2008927"],"award-info":[{"award-number":["CCF-2008927"]}]},{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["503400-78050","N00014-15-1-2550"],"award-info":[{"award-number":["503400-78050","N00014-15-1-2550"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Signal Process."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tsp.2022.3198166","type":"journal-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:28:20Z","timestamp":1660246100000},"page":"4170-4185","source":"Crossref","is-referenced-by-count":1,"title":["Fixed-Horizon Active Hypothesis Testing and Anomaly Detection"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2865-356X","authenticated-orcid":false,"given":"Dhruva","family":"Kartik","sequence":"first","affiliation":[{"name":"Ming Hsieh Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8896-1177","authenticated-orcid":false,"given":"Urbashi","family":"Mitra","sequence":"additional","affiliation":[{"name":"Ming Hsieh Department of Electrical and Computer Engineering, University of Southern California, Los Angeles, CA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2018.8594163"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3041780"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2778264"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2707485"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736836"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2394246"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3072962"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AIM.2001.936897"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3029459"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849555"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2866257"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3090742"},{"article-title":"Channel Coding: Non-Asymptotic Fundamental Limits","year":"2010","author":"Polyanskiy","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3096555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref16","article-title":"Binary hypothesis testing with feedback","volume-title":"Proc. Inf. Theory Appl. Workshop","author":"Polyanskiy","year":"2011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849436"},{"volume-title":"Sequential Analysis","year":"1973","author":"Wald","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706205"},{"volume-title":"Theory and Applications of the Sequential Design of Experiments, K-actions and Infinitely Many Experiments","year":"1960","author":"Bessler","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2261188"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/13-AOS1144"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437673"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683450"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2918981"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006677"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2178156"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2310477"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11889342_45"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6855211"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2883604"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174399"},{"volume-title":"A Course in Game Theory","year":"1994","author":"Osborne","key":"ref33"},{"key":"ref34","article-title":"Lecture notes on information theory","volume-title":"Lecture Notes for ECE563 (UIUC)","volume":"6","author":"Polyanskiy","year":"2014"},{"volume-title":"Introduction to Probability Models","year":"2014","author":"Ross","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2043769"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813610"}],"container-title":["IEEE Transactions on Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/78\/9675017\/9855225-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/78\/9675017\/09855225.pdf?arnumber=9855225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:32:38Z","timestamp":1710383558000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9855225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/tsp.2022.3198166","relation":{},"ISSN":["1053-587X","1941-0476"],"issn-type":[{"type":"print","value":"1053-587X"},{"type":"electronic","value":"1941-0476"}],"subject":[],"published":{"date-parts":[[2022]]}}}