{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:41:38Z","timestamp":1761129698451,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/wcnc.2019.8885841","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T20:17:22Z","timestamp":1572553042000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["GNU Radio Implementation of MALIN: \u201cMulti-Armed bandits Learning for Internet-of-things Networks\u201d"],"prefix":"10.1109","author":[{"given":"Lilian","family":"Besson","sequence":"first","affiliation":[]},{"given":"Remi","family":"Bonnefoi","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Moy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Coexistence of Communication Systems Based on Enhanced Multi-Carrier Waveforms with Legacy OFDM Networks","year":"2017","author":"bodinier","key":"ref10"},{"journal-title":"USRP Manual Ettus Research","year":"0","key":"ref11"},{"journal-title":"GNU Radio Documentation","year":"0","key":"ref12"},{"journal-title":"GRC Documentation","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref16","first-page":"39","article-title":"Analysis of Thompson sampling for the Multi-Armed Bandit problem","author":"agrawal","year":"0","journal-title":"JMLR Conference On Learning Theory"},{"key":"ref17","first-page":"199","author":"kaufmann","year":"2012","journal-title":"Thompson Sampling an Asymptotically Optimal Finite-Time Analysis"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794785"},{"key":"ref19","article-title":"Competition: Channel Exploration\/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment","author":"maskooki","year":"0","journal-title":"EWSN"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647894"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1044-2"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time Analysis of the Multi-armed Bandit Problem","volume":"47","author":"auer","year":"2002","journal-title":"Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76207-4_15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2652320"},{"key":"ref9","article-title":"Multi-Player Bandits Revisited","author":"besson","year":"2018","journal-title":"Algorithmic Learning Theory"},{"key":"ref20","article-title":"Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks","volume":"2","author":"moy","year":"2016","journal-title":"EAI Endorsed Transactions on Cognitive Communications"},{"journal-title":"OctoClock Clock Distribution Module with GPSDO - Ettus Research","year":"0","key":"ref21"}],"event":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2019,4,15]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2019,4,18]]}},"container-title":["2019 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8870904\/8885408\/08885841.pdf?arnumber=8885841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:50:25Z","timestamp":1658141425000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8885841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2019.8885841","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}