{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:38:18Z","timestamp":1766137098258,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242110","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"99-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Reinforcement Learning Techniques for Optimized Channel Hopping in IEEE 802.15.4-TSCH Networks"],"prefix":"10.1145","author":[{"given":"Hiba","family":"Dakdouk","sequence":"first","affiliation":[{"name":"IMT Atlantique, Rennes, France"}]},{"given":"Erika","family":"Tarazona","sequence":"additional","affiliation":[{"name":"IMT Atlantique, Rennes, France"}]},{"given":"Reda","family":"Alami","sequence":"additional","affiliation":[{"name":"Orange Labs, Lannion, France"}]},{"given":"Rapha\u00ebl","family":"F\u00e9raud","sequence":"additional","affiliation":[{"name":"Orange Labs, Lannion, France"}]},{"given":"Georgios Z.","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"IMT Atlantique, Rennes, France"}]},{"given":"Patrick","family":"Maill\u00e9","sequence":"additional","affiliation":[{"name":"IMT Atlantique, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"volume-title":"Proc. of NIPS BayesOpt","author":"Alami R.","key":"e_1_3_2_1_1_1","unstructured":"R. Alami , O. A. Maillard , and R. F\u00e9raud . 2017. Memory Bandits: a Bayesian Approach for the Switching Bandit Problem . In Proc. of NIPS BayesOpt . Long Beach, USA. R. Alami, O. A. Maillard, and R. F\u00e9raud. 2017. Memory Bandits: a Bayesian Approach for the Switching Bandit Problem. In Proc. of NIPS BayesOpt. Long Beach, USA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-017-0050-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"volume-title":"Proc. of IEEE ISWCS. 1083--1087","author":"Avrachenkov K.","key":"e_1_3_2_1_5_1","unstructured":"K. Avrachenkov , L. Cottatellucci , and L. Maggi . 2012. Slow fading channel selection: A restless multi-armed bandit formulation . In Proc. of IEEE ISWCS. 1083--1087 . K. Avrachenkov, L. Cottatellucci, and L. Maggi. 2012. Slow fading channel selection: A restless multi-armed bandit formulation. In Proc. of IEEE ISWCS. 1083--1087."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240116.2240123"},{"volume-title":"Proc. of NIPS .","author":"Besbes O.","key":"e_1_3_2_1_7_1","unstructured":"O. Besbes , Y. Gur , and A. Zeevi . 2014. Stochastic Multi-Armed-Bandit Problem with Non-stationary Rewards . In Proc. of NIPS . O. Besbes, Y. Gur, and A. Zeevi. 2014. Stochastic Multi-Armed-Bandit Problem with Non-stationary Rewards. In Proc. of NIPS ."},{"key":"e_1_3_2_1_8_1","volume-title":"Biometrika","volume":"66","author":"Gittins J. C.","year":"1979","unstructured":"J. C. Gittins and D. M. Jones . 1979. A Dynamic Allocation Index for the Discounted Multiarmed Bandit Problem . Biometrika , Vol. 66 , 3 ( 1979 ). J. C. Gittins and D. M. Jones. 1979. A Dynamic Allocation Index for the Discounted Multiarmed Bandit Problem. Biometrika , Vol. 66, 3 (1979)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"P. H. Gomes T. Watteyne and B. Krishnamachari. 2017. MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping. Transactions on Emerging Telecommunications Technologies (2017).  P. H. Gomes T. Watteyne and B. Krishnamachari. 2017. MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping. Transactions on Emerging Telecommunications Technologies (2017).","DOI":"10.1002\/ett.3223"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE Standard for Low-Rate Wireless Networks","author":"EE.","year":"2015","unstructured":"IE EE. 2016. IEEE Standard for Low-Rate Wireless Networks . IEEE Std 802.15.4-- 2015 (Revision of IEEE Std 802.15.4--2011) (2016), 1--709. IEEE. 2016. IEEE Standard for Low-Rate Wireless Networks. IEEE Std 802.15.4--2015 (Revision of IEEE Std 802.15.4--2011) (2016), 1--709."},{"key":"e_1_3_2_1_11_1","volume-title":"International Society of Automation (ISA) Std.","volume":"1","year":"2011","unstructured":"ISA-100.11a-2011:. May 2011 . Wireless Systems for Industrial Automation:Process Control and Related Applications . International Society of Automation (ISA) Std. , Vol. 1 ( May 2011). ISA-100.11a-2011:. May 2011. Wireless Systems for Industrial Automation:Process Control and Related Applications. International Society of Automation (ISA) Std. , Vol. 1 ( May 2011)."},{"volume-title":"Proc. of International Conference on Telecommunications .","author":"Kerkouche R.","key":"e_1_3_2_1_12_1","unstructured":"R. Kerkouche , R. Alami , R. F\u00e9raud , N. Varsier , and P. Maill\u00e9 . 2018. Node-based optimization of LoRa transmissions with Multi-Armed Bandit algorithms . In Proc. of International Conference on Telecommunications . R. Kerkouche, R. Alami, R. F\u00e9raud, N. Varsier, and P. Maill\u00e9. 2018. Node-based optimization of LoRa transmissions with Multi-Armed Bandit algorithms. In Proc. of International Conference on Telecommunications ."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127540.3127541"},{"volume-title":"Proc. of IEEE ICC. 1--6.","author":"Kotsiou V.","key":"e_1_3_2_1_14_1","unstructured":"V. Kotsiou , G. Z. Papadopoulos , P. Chatzimisios , and F. Tholeyre . 2017b. Is local blacklisting relevant in slow channel hopping low-power wireless networks? . In Proc. of IEEE ICC. 1--6. V. Kotsiou, G. Z. Papadopoulos, P. Chatzimisios, and F. Tholeyre. 2017b. Is local blacklisting relevant in slow channel hopping low-power wireless networks?. In Proc. of IEEE ICC. 1--6."},{"volume-title":"Proc. of IEEE ISWCS. 511--515","author":"Li P.","key":"e_1_3_2_1_15_1","unstructured":"P. Li , T. Vermeulen , H. Liy , and S. Pollin . 2015. An Adaptive Channel Selection scheme for Reliable TSCH-based Communication . In Proc. of IEEE ISWCS. 511--515 . P. Li, T. Vermeulen, H. Liy, and S. Pollin. 2015. An Adaptive Channel Selection scheme for Reliable TSCH-based Communication. In Proc. of IEEE ISWCS. 511--515."},{"volume-title":"Proc. of AISTATS .","author":"Mellor J.","key":"e_1_3_2_1_16_1","unstructured":"J. Mellor and J. Shapiro . 2013. Thompson Sampling in Switching Environments with Bayesian Online Change Point Detection . In Proc. of AISTATS . J. Mellor and J. Shapiro. 2013. Thompson Sampling in Switching Environments with Bayesian Online Change Point Detection. In Proc. of AISTATS ."},{"volume-title":"Proc. of International Conference on Algorithmic Learning Theory .","author":"Moulines E.","key":"e_1_3_2_1_17_1","unstructured":"E. Moulines and A. Garivier . 2011. On Upper-Confidence Bound Policies for Switching Bandit Problems . In Proc. of International Conference on Algorithmic Learning Theory . E. Moulines and A. Garivier. 2011. On Upper-Confidence Bound Policies for Switching Bandit Problems. In Proc. of International Conference on Algorithmic Learning Theory ."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989293.2989300"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.012"},{"key":"e_1_3_2_1_20_1","volume-title":"75: TDMA Data-Link Layer","author":"Specification HART","year":"2008","unstructured":"Wireless HART Specification . 2008. 75: TDMA Data-Link Layer . HART Communication Foundation Std., Rev , Vol. 1 ( 2008 ). WirelessHART Specification. 2008. 75: TDMA Data-Link Layer. HART Communication Foundation Std., Rev , Vol. 1 (2008)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158231"},{"key":"e_1_3_2_1_22_1","volume-title":"Biometrika","volume":"25","author":"Thompson W.","year":"1933","unstructured":"W. Thompson . 1933 . On the likelihood that one unknown probability exceeds another in view of the evidence of two samples . Biometrika , Vol. 25 , 3 (1933). W. Thompson. 1933. On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika , Vol. 25, 3 (1933)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41575-3_31"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641876.1641898"},{"volume-title":"Proc. of IEEE ICC . 1--6.","author":"Zorbas D.","key":"e_1_3_2_1_25_1","unstructured":"D. Zorbas , G. Z. Papadopoulos , and C. Douligeris . 2017. Local or Global Radio Channel Blacklisting for IEEE 802.15.4-TSCH Networks? . In Proc. of IEEE ICC . 1--6. D. Zorbas, G. Z. Papadopoulos, and C. Douligeris. 2017. Local or Global Radio Channel Blacklisting for IEEE 802.15.4-TSCH Networks?. In Proc. of IEEE ICC . 1--6."}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWIM '18"},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:35Z","timestamp":1750207415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":25,"alternative-id":["10.1145\/3242102.3242110","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242110","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}