{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:41:25Z","timestamp":1761129685717},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/wcncw.2019.8902891","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:44:54Z","timestamp":1574707494000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Upper-Confidence Bound for Channel Selection in LPWA Networks with Retransmissions"],"prefix":"10.1109","author":[{"given":"Remi","family":"Bonnefoi","sequence":"first","affiliation":[]},{"given":"Lilian","family":"Besson","sequence":"additional","affiliation":[]},{"given":"Julio","family":"Manco-Vasquez","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Moy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref11","article-title":"Multi-Player Bandits Revisited","author":"besson","year":"2018","journal-title":"Algorithmic Learning Theory (Lanzarote Spain)"},{"article-title":"SIC-MMAB: Synchronisation Involves Communication in Multiplayer Multi-Armed Bandits","year":"2018","author":"boursier","key":"ref12"},{"key":"ref13","first-page":"1","article-title":"Two-stage decision making policy for opportunistic spectrum access and validation on USRP testbed","author":"kumar","year":"2016","journal-title":"Wireless Networks"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2728011"},{"key":"ref15","article-title":"Competition: Channel Exploration\/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment","author":"maskooki","year":"2016","journal-title":"EWSN-International Conference on Embedded Wireless Systems and Networks (dependability competition)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794785"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1024916.1024920"},{"journal-title":"Markov Chains-Cambridge Series in Statistical and Probabilistic Mathematics","year":"1998","author":"norris","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2012.6399192"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647894"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1044-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2652320"},{"key":"ref9","article-title":"Multi- Armed Bandit Learning in IoT Networks: Learning helps even in non-stationary settings","author":"bonnefoi","year":"2017","journal-title":"12th EAI Conference on Cognitive Radio Oriented Wireless Network and Communication CROWNCOM Proceedings"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/978-3-540-75225-7_15","article-title":"Tuning bandit algorithms in stochastic environments","author":"audibert","year":"2007","journal-title":"International Conference on Algorithmic Learning Theory"},{"key":"ref22","article-title":"Nearly Optimal Adaptive Procedure for Piecewise-Stationary Bandit: a Change-Point Detection Approach","author":"cao","year":"2019","journal-title":"AISTATS"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-642-24412-4_16","article-title":"On upper-confidence bound policies for switching bandit problems","author":"garivier","year":"2011","journal-title":"International Conference on Algorithmic Learning Theory"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885841"},{"key":"ref23","article-title":"Spectrum Utilization and Reconfiguration Cost Comparison of Various Decision Making Policies for Opportunistic Spectrum Access Using Real Radio Signals","author":"darak","year":"2016","journal-title":"CROWNCOM 2016"}],"event":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","start":{"date-parts":[[2019,4,15]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2019,4,18]]}},"container-title":["2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8893977\/8902334\/08902891.pdf?arnumber=8902891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:23:14Z","timestamp":1658262194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8902891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wcncw.2019.8902891","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}