{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:17:14Z","timestamp":1776093434265,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/twc.2020.3006922","type":"journal-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:14:33Z","timestamp":1594678473000},"page":"6899-6915","source":"Crossref","is-referenced-by-count":98,"title":["Cache-Aided NOMA Mobile Edge Computing: A Reinforcement Learning Approach"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4452-4108","authenticated-orcid":false,"given":"Zhong","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6389-8941","authenticated-orcid":false,"given":"Yuanwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Naofal","family":"Al-Dhahir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761349"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700308"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2885266"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2650987"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2726718"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1500657CM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2019.2907864"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.112"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2611964"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2633522"},{"key":"ref12","article-title":"Optimized computation offloading performance in virtual edge computing systems via deep reinforcement learning","volume-title":"arXiv:1805.06146","author":"Chen","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2928811"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756980"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2870894"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2881725"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2796542"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2882846"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2876019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2875984"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2933835"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2841929"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2830376"},{"key":"ref24","article-title":"Cache-aided non-orthogonal multiple access","volume-title":"arXiv:1712.09557","author":"Xiang","year":"2017"},{"key":"ref25","article-title":"Leveraging edge caching in NOMA systems with QoS requirements","volume-title":"arXiv:1801.07430","author":"Armando Oviedo","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2892468"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700291"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700167"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674939"},{"issue":"3","key":"ref30","volume-title":"Dynamic Programming and Optimal Control","volume":"1","author":"Bertsekas","year":"2005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800601"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2924015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2935450"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2867191"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2913162"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878435"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2703901"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2875747"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10347"},{"key":"ref40","first-page":"879","article-title":"Predrnn: Recurrent neural networks for predictive learning using spatiotemporal LSTMs","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Wang"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017570"},{"key":"ref42","article-title":"Multi-armed bandit for energy-efficient and delay-sensitive edge computing in dynamic networks with uncertainty","volume-title":"arXiv:1904.06258","author":"Ghoorchian","year":"2019"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2705039"},{"key":"ref44","article-title":"Learning automata based Q-learning for content placement in cooperative caching","volume-title":"arXiv:1903.06235","author":"Yang","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2549378"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524694"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2559459"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2785305"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2545382"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.2.270"},{"key":"ref52","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2016"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2008.67"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2683482"},{"key":"ref55","first-page":"4863","article-title":"Is Q-learning provably efficient?","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Jin"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946659"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2014.7004541"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/9218016\/09139263.pdf?arnumber=9139263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:05:22Z","timestamp":1706058322000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9139263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":57,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/twc.2020.3006922","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}