{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T02:24:03Z","timestamp":1768530243354,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"JSPS KAKENHI","award":["JP19H04174"],"award-info":[{"award-number":["JP19H04174"]}]},{"name":"JSPS KAKENHI","award":["JP21K14162"],"award-info":[{"award-number":["JP21K14162"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/tvt.2021.3116223","type":"journal-article","created":{"date-parts":[[2021,9,28]],"date-time":"2021-09-28T21:40:42Z","timestamp":1632865242000},"page":"12101-12112","source":"Crossref","is-referenced-by-count":30,"title":["Sleeping Contextual\/Non-Contextual Thompson Sampling MAB for mmWave D2D Two-Hop Relay Probing"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5443-9711","authenticated-orcid":false,"given":"Ehab Mahmoud","family":"Mohamed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4443-7066","authenticated-orcid":false,"given":"Sherief","family":"Hashima","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1536-1269","authenticated-orcid":false,"given":"Kohei","family":"Hatano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1790-8640","authenticated-orcid":false,"given":"Mostafa M.","family":"Fouda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4785-2425","authenticated-orcid":false,"given":"Zubair Md","family":"Fadlullah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2007.897513"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3088096"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2991535"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933764"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07313-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10020169"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2625300"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968562"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801350"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s20143947"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2012.6392842"},{"key":"ref40","article-title":"Channel models for 60 GHz WLAN systems","author":"a","year":"2010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700393"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375934"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2452492"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2753280"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.01.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-179052"},{"key":"ref18","first-page":"99","article-title":"Further optimal regret bounds for thompson sampling","author":"agrawal","year":"2013","journal-title":"Proc 16th Int Conf Artif Intell Statist"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2900038"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260813"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919099"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900652"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2766629"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7498076"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2012.2235056"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972614"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2552239"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2738198"},{"key":"ref9","first-page":"95","article-title":"Millimeter wave beamforming training: A reinforcement learning approach","volume":"67","author":"mohamed","year":"2021","journal-title":"Int J Electron Telecommun"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E98.B.1932"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5178-7"},{"key":"ref20","first-page":"127","article-title":"Thompson sampling for contextual bandits with linear payoffs","volume":"28","author":"agrawal","year":"2013","journal-title":"Proc 30th Int Conf Mach Learn PMLR"},{"key":"ref45","first-page":"1","article-title":"Analysis of thompson sampling for stochastic sleeping bandits","author":"chatterjee","year":"2017","journal-title":"Proc Conf Uncertainty Artif Intell"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2787990"},{"key":"ref47","first-page":"586","article-title":"Parametric bandits: The generalized linear case","volume":"1","author":"filippi","year":"2010","journal-title":"Proc 23rd Int Conf Neural Inf Process Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918583"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.01.006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3026710"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2759106"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2915824"},{"key":"ref44","first-page":"39.1","article-title":"Analysis of thompson sampling for the multi-armed bandit problem","volume":"23","author":"agrawal","year":"0","journal-title":"Proc 25th Annu Conf Learn Theory Ser Proc Mach Learn Res"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931876"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2435357"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2825318"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/9619988\/09551710.pdf?arnumber=9551710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:48:46Z","timestamp":1652194126000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9551710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":47,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2021.3116223","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11]]}}}