{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:29:38Z","timestamp":1767338978489,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Science and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000196","name":"Canada Foundation for Innovation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000196","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007711","name":"British Columbia Knowledge Development Fund (BCKDF) of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/twc.2021.3082080","type":"journal-article","created":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T23:28:25Z","timestamp":1622158105000},"page":"7272-7285","source":"Crossref","is-referenced-by-count":9,"title":["TSOR: Thompson Sampling-Based Opportunistic Routing"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6465-591X","authenticated-orcid":false,"given":"Zhiming","family":"Huang","sequence":"first","affiliation":[]},{"given":"Yifan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"535","article-title":"Tight regret bounds for stochastic combinatorial semi-bandits","author":"kveton","year":"2015","journal-title":"Proc Artif Intell Statist (AISTATS)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1126\/science.153.3731.34"},{"key":"ref33","article-title":"Thompson sampling for combinatorial semi-bandits with sleeping arms and long-term fairness constraints","author":"huang","year":"2020","journal-title":"arXiv 2005 06725"},{"key":"ref32","first-page":"5114","article-title":"Thompson sampling for combinatorial semi-bandits","author":"wang","year":"2018","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref31","first-page":"2249","article-title":"An empirical evaluation of Thompson sampling","author":"chapelle","year":"2011","journal-title":"Proc Adv Neural Inf Process Syst (NeurlPS)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2930464"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3088510"},{"key":"ref35","first-page":"39.1","article-title":"Analysis of Thompson sampling for the multi-armed bandit problem","volume":"23","author":"agrawal","year":"2012","journal-title":"Proc Conf Learn Theory (COLT)"},{"key":"ref34","first-page":"592","article-title":"On Bayesian upper confidence bounds for bandit problems","author":"kaufmann","year":"2012","journal-title":"Proc Artif Intell Statist (AISTATS)"},{"key":"ref10","article-title":"The network-based candidate forwarding set optimization approach for opportunistic routing in wireless sensor network","author":"li","year":"2019","journal-title":"arXiv 1912 08098"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.832204"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2413398"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.11.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107892"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700297"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2796101"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06708-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-148"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364183"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107505"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159844"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1195"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1990.204000"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1583"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.860280"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-014-0551-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CAMSAP.2013.6714028"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080108"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1255650"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5296\/npa.v2i4.547"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2871036"},{"journal-title":"Routing information protocol","year":"2019","author":"hedrick","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282400"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462249"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494225"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.02.009"},{"article-title":"Estimation and learning for cognitive networking","year":"2013","author":"tehrani","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2015.7343571"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275797"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2111382"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/9610145\/09442886.pdf?arnumber=9442886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T21:46:47Z","timestamp":1645480007000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9442886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":41,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/twc.2021.3082080","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"type":"print","value":"1536-1276"},{"type":"electronic","value":"1558-2248"}],"subject":[],"published":{"date-parts":[[2021,11]]}}}