{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T13:30:41Z","timestamp":1769002241073,"version":"3.49.0"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Israel Ministry of Economy under the Magnet Consortium program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/twc.2023.3310353","type":"journal-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T17:38:55Z","timestamp":1694021935000},"page":"3691-3705","source":"Crossref","is-referenced-by-count":7,"title":["Multi-Flow Transmission in Wireless Interference Networks: A Convergent Graph Learning Approach"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4532-2762","authenticated-orcid":false,"given":"Raz","family":"Paul","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Be&#x2019;er Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0532-009X","authenticated-orcid":false,"given":"Kobi","family":"Cohen","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Be&#x2019;er Sheva, Israel"}]},{"given":"Gil","family":"Kedar","sequence":"additional","affiliation":[{"name":"Ceragon Networks Ltd., Tel Aviv, Israel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139565844"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2623317"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2094204"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.083111.110194"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518237"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3223152"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935068"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2198613"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2230215"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2014.7094730"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437583"},{"key":"ref12","first-page":"7222","article-title":"Distributed multi-player bandits-a game of thrones approach","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bistritz"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3048223"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9304511"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3043431"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171666"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3224790"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/s0001867800047790"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref20","first-page":"1899","article-title":"Multi-armed bandit-based routing method for in-network caching","volume-title":"Proc. Asia\u2013Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA ASC)","author":"Tabei"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2809722"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904329"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2879433"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3230872"},{"key":"ref25","first-page":"232","article-title":"Adaptive shortest-path routing under unknown and stochastically varying link states","volume-title":"Proc. 10th Int. Symp. Modeling Optim. Mobile, Ad Hoc Wireless Netw. (WiOpt)","author":"Liu"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638236"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2747409"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950055"},{"key":"ref30","article-title":"Deep reinforcement learning meets graph neural networks: An optical network routing use case","author":"Almasan","year":"2019","journal-title":"arXiv:1910.07421"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3082080"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3046275"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3282365"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2966795"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2910409"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3141164"},{"key":"ref37","article-title":"Why deep neural networks for function approximation?","author":"Liang","year":"2016","journal-title":"arXiv:1610.04161"},{"key":"ref38","first-page":"1","article-title":"Graph convolutional reinforcement learning","volume-title":"Proc. ICLR","author":"Jiang"},{"key":"ref39","article-title":"QGNN: Value function factorisation with graph neural networks","author":"Kortvelesy","year":"2022","journal-title":"arXiv:2205.13005"},{"key":"ref40","first-page":"590","article-title":"PIC: Permutation invariant critic for multi-agent deep reinforcement learning","volume-title":"Proc. Conf. Robot Learn.","author":"Liu"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00198-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100125"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036965"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/772"},{"key":"ref46","article-title":"Parallel and distributed graph neural networks: An in-depth concurrency analysis","author":"Besta","year":"2022","journal-title":"arXiv:2205.09702"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00049"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM51124.2021.00012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514069"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref51","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2626578"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv10h9d35"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1287\/moor.13.2.311"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1006\/game.1993.1023"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166243"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120922"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513261"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.017"},{"key":"ref62","first-page":"1","article-title":"Performance evaluation of IoT mesh networking technology in ISM frequency band","volume-title":"Proc. 17th Int. Conf. Mechatronics Mechatronika (ME)","author":"Vondrou\u0161"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254761"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1364\/JON.3.000363"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2012.4202"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/10496346\/10242346.pdf?arnumber=10242346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T19:12:39Z","timestamp":1712862759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10242346\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":66,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/twc.2023.3310353","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}