{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,11]],"date-time":"2025-05-11T04:01:45Z","timestamp":1746936105680,"version":"3.40.5"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1109\/wcnc61545.2025.10978507","type":"proceedings-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:53:33Z","timestamp":1746813213000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Recommendation Aided Caching Using Combinatorial Multi-Armed Bandits"],"prefix":"10.1109","author":[{"given":"Pavamana K","family":"J","sequence":"first","affiliation":[{"name":"Indian Institute of Science,Department of Electronics System Engineering,Bengaluru,India"}]},{"given":"Chandramani Kishore","family":"Singh","sequence":"additional","affiliation":[{"name":"Indian Institute of Science,Department of Electronics System Engineering,Bengaluru,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057031"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2831690"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148740"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3075278"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3076495"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3146901"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2843948"},{"journal-title":"Recommenadation aided caching using combinatorial multiarmed bandits","year":"2024","author":"Pavamana","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2716310"},{"key":"ref10","article-title":"Matroid bandits: Fast combinatorial optimization with learning","author":"Kveton","year":"2014","journal-title":"CoRR, absI1403.5045"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2018.8555592"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2844983"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2853548"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3150961"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20536"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3375113"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3014266"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879193"}],"event":{"name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2025,3,24]]},"location":"Milan, Italy","end":{"date-parts":[[2025,3,27]]}},"container-title":["2025 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10978109\/10978116\/10978507.pdf?arnumber=10978507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:38:39Z","timestamp":1746859119000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10978507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wcnc61545.2025.10978507","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]}}}