{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:34:32Z","timestamp":1773246872612,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Army Research Office","award":["W911NF1910221"],"award-info":[{"award-number":["W911NF1910221"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1910112, CNS-1731658"],"award-info":[{"award-number":["CNS-1910112, CNS-1731658"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"US DoT supported D-STOP Tier 1 University Transportation Center"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1145\/3466772.3467044","type":"proceedings-article","created":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T10:38:19Z","timestamp":1624963099000},"page":"151-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["MmWave Codebook Selection in Rapidly-Varying Channels via Multinomial Thompson Sampling"],"prefix":"10.1145","author":[{"given":"Yi","family":"Zhang","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Soumya","family":"Basu","sequence":"additional","affiliation":[{"name":"Google, LLC, Mountain View, CA, USA"}]},{"given":"Sanjay","family":"Shakkottai","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"suffix":"Jr.","given":"Robert W.","family":"Heath","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,7,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"15","article-title":"IEEE Standard for Information technology- Local and metropolitan area networks- Specific requirements- Part 15.3","volume":"802","year":"2009","unstructured":"2009 . IEEE Standard for Information technology- Local and metropolitan area networks- Specific requirements- Part 15.3 : Amendment 2: Millimeter-wave-based Alternative Physical Layer Extension. IEEE Std 802 . 15 .3c-2009 (Amendment to IEEE Std 802.15.3-2003) (Oct. 2009), 1--200. 2009. IEEE Standard for Information technology- Local and metropolitan area networks- Specific requirements- Part 15.3: Amendment 2: Millimeter-wave-based Alternative Physical Layer Extension. IEEE Std 802.15.3c-2009 (Amendment to IEEE Std 802.15.3-2003) (Oct. 2009), 1--200.","journal-title":"Amendment 2: Millimeter-wave-based Alternative Physical Layer Extension. IEEE Std"},{"key":"e_1_3_2_1_3_1","first-page":"11","article-title":"IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11","volume":"802","year":"2016","unstructured":"2016 . IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802 . 11 - 2016 (Revision of IEEE Std 802.11-2012) (Dec. 2016), 1--3534. 2016. IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012) (Dec. 2016), 1--3534.","journal-title":"IEEE Std"},{"key":"e_1_3_2_1_4_1","unstructured":"2019. IEEE Draft Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-Amendment: Enhanced Throughput for Operation in License-Exempt Bands Above 45 GHz. IEEE P802.11ay\/D4.0 June 2019 (Jul. 2019) 1--791.  2019. IEEE Draft Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-Amendment: Enhanced Throughput for Operation in License-Exempt Bands Above 45 GHz. IEEE P802.11ay\/D4.0 June 2019 (Jul. 2019) 1--791."},{"key":"e_1_3_2_1_5_1","volume-title":"Jun. 2019 (Jun.","year":"2019","unstructured":"2019. System Architecture for the 5G System. document TS 23.501 V16.1.0, 3GPP , Jun. 2019 (Jun. 2019 ), 1--219. 2019. System Architecture for the 5G System. document TS 23.501 V16.1.0, 3GPP, Jun. 2019 (Jun. 2019), 1--219."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the 25th Annual Conference on Learning Theory (COLT'12)","author":"Agrawal Shipra","year":"2012","unstructured":"Shipra Agrawal and Navin Goyal . 2012 . Analysis of Thompson Sampling for the Multi-armed Bandit Problem . In Proc. of the 25th Annual Conference on Learning Theory (COLT'12) . Edinburgh, Scotland, 39.1-39.26. Shipra Agrawal and Navin Goyal. 2012. Analysis of Thompson Sampling for the Multi-armed Bandit Problem. In Proc. of the 25th Annual Conference on Learning Theory (COLT'12). Edinburgh, Scotland, 39.1-39.26."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the Sixteenth International Conference on Artificial Intelligence and Statistics (AISTATS'13)","author":"Agrawal Shipra","year":"2013","unstructured":"Shipra Agrawal and Navin Goyal . 2013 . Further Optimal Regret Bounds for Thompson Sampling . In Proc. of the Sixteenth International Conference on Artificial Intelligence and Statistics (AISTATS'13) . Scottsdale, Arizona, USA, 99--107. Shipra Agrawal and Navin Goyal. 2013. Further Optimal Regret Bounds for Thompson Sampling. In Proc. of the Sixteenth International Conference on Artificial Intelligence and Statistics (AISTATS'13). Scottsdale, Arizona, USA, 99--107."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155408"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2986459.2986710"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933967"},{"key":"e_1_3_2_1_12_1","volume-title":"Beamforming Learning for mmWave Communication: Theory and Experimental Validation. arXiv ePrint","author":"Chraiti Mohaned","year":"1912","unstructured":"Mohaned Chraiti , Dmitry Chizhik , Jinfeng Du , Reinaldo A. Valenzuela , Ali Ghrayeb , and Chadi Assi . 2019. Beamforming Learning for mmWave Communication: Theory and Experimental Validation. arXiv ePrint 1912 .12406. Mohaned Chraiti, Dmitry Chizhik, Jinfeng Du, Reinaldo A. Valenzuela, Ali Ghrayeb, and Chadi Assi. 2019. Beamforming Learning for mmWave Communication: Theory and Experimental Validation. arXiv ePrint 1912.12406."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of the 31st International Conference on Machine Learning (ICML '14)","author":"Combes Richard","year":"2014","unstructured":"Richard Combes and Alexandre Proutiere . 2014 . Unimodal Bandits: Regret Lower Bounds and Optimal Algorithms . In Proc. of the 31st International Conference on Machine Learning (ICML '14) . Beijing, China, 521--529. Richard Combes and Alexandre Proutiere. 2014. Unimodal Bandits: Regret Lower Bounds and Optimal Algorithms. In Proc. of the 31st International Conference on Machine Learning (ICML '14). Beijing, China, 521--529."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2951821"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2772881"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the 24th Annual Conference on Learning Theory (COLT '11)","author":"Garivier Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Garivier and Olivier Capp\u00e9 . 2011 . The KL-UCB Algorithm for Bounded Stochastic Bandits and Beyond . In Proc. of the 24th Annual Conference on Learning Theory (COLT '11) . Budapest, Hungary, 359--376. Aur\u00e9lien Garivier and Olivier Capp\u00e9. 2011. The KL-UCB Algorithm for Bounded Stochastic Bandits and Beyond. In Proc. of the 24th Annual Conference on Learning Theory (COLT '11). Budapest, Hungary, 359--376."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241556"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700207"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of the 31st International Conference on on Machine Learning (ICML '14)","author":"Gopalan Aditya","year":"2014","unstructured":"Aditya Gopalan , Shie Mannor , and Yishay Mansour . 2014 . Thompson Sampling for Complex Online Problems . In Proc. of the 31st International Conference on on Machine Learning (ICML '14) . Beijing, China, 100--108. Aditya Gopalan, Shie Mannor, and Yishay Mansour. 2014. Thompson Sampling for Complex Online Problems. In Proc. of the 31st International Conference on on Machine Learning (ICML '14). Beijing, China, 100--108."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486206"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737610"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486279"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230581"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2931703"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34106-9_18"},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Kome Oteri","year":"2016","unstructured":"Oteri Kome , Lin Cen , Lou Hanqing , and Yang Rui . 2016 . Further Details on Multi-Stage, Multi-Resolution Beamforming Training in 802.11ay, doc.: IEEE 802.11-16\/1447r1 . Retrieved Dec. 12, 2020 from https:\/\/mentor.ieee.org\/802.11\/dcn\/16\/11-16-1447-01-00ay-further-details-on-multi-stage-multi-resolution-beamforming-training-in-802-11ay.pptx Oteri Kome, Lin Cen, Lou Hanqing, and Yang Rui. 2016. Further Details on Multi-Stage, Multi-Resolution Beamforming Training in 802.11ay, doc.: IEEE 802.11-16\/1447r1. Retrieved Dec. 12, 2020 from https:\/\/mentor.ieee.org\/802.11\/dcn\/16\/11-16-1447-01-00ay-further-details-on-multi-stage-multi-resolution-beamforming-training-in-802-11ay.pptx"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2947923"},{"key":"e_1_3_2_1_28_1","first-page":"11","article-title":"Initial Access in 5G mmWave Cellular Networks","volume":"54","author":"Marco Giordani","year":"2016","unstructured":"Giordani Marco , Mezzavilla Marco , and Zorzi Michele . 2016 . Initial Access in 5G mmWave Cellular Networks . IEEE Commun. Mag. 54 , 11 (Nov. 2016), 40--47. Giordani Marco, Mezzavilla Marco, and Zorzi Michele. 2016. Initial Access in 5G mmWave Cellular Networks. IEEE Commun. Mag. 54, 11 (Nov. 2016), 40--47.","journal-title":"IEEE Commun. Mag."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218630"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241576"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298483.3298593"},{"key":"e_1_3_2_1_32_1","first-page":"3","article-title":"IEEE 802.11ay-Based mmWave WLANs: Design Challenges and Solutions","volume":"20","author":"Pei Zhou","year":"2018","unstructured":"Zhou Pei , Cheng Kaijun , Han Xiao , Fang Xuming , Fang Yuguang , He Rong , Long Yan , and Liu Yanping . 2018 . IEEE 802.11ay-Based mmWave WLANs: Design Challenges and Solutions . IEEE Communications Surveys & Tutorials 20 , 3 (Thirdquarter 2018), 1654--1681. Zhou Pei, Cheng Kaijun, Han Xiao, Fang Xuming, Fang Yuguang, He Rong, Long Yan, and Liu Yanping. 2018. IEEE 802.11ay-Based mmWave WLANs: Design Challenges and Solutions. IEEE Communications Surveys & Tutorials 20, 3 (Thirdquarter 2018), 1654--1681.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of the 31st International Conference on Algorithmic Learning Theory (ALT '20)","volume":"117","author":"Riou Charles","year":"2020","unstructured":"Charles Riou and Junya Honda . 2020 . Bandit Algorithms Based on Thompson Sampling for Bounded Reward Distributions . In Proc. of the 31st International Conference on Algorithmic Learning Theory (ALT '20) , Vol. 117 . San Diego, CA, USA, 777--826. Charles Riou and Junya Honda. 2020. Bandit Algorithms Based on Thompson Sampling for Bounded Reward Distributions. In Proc. of the 31st International Conference on Algorithmic Learning Theory (ALT '20), Vol. 117. San Diego, CA, USA, 777--826."},{"key":"e_1_3_2_1_34_1","volume-title":"Beam-searching and Transmission Scheduling in Millimeter Wave Communications. In 2015 IEEE International Conference on Communications","author":"Shokri-Ghadikolaei Hossein","year":"2015","unstructured":"Hossein Shokri-Ghadikolaei , Lazaros Gkatzikis , and Carlo Fischione . 2015 . Beam-searching and Transmission Scheduling in Millimeter Wave Communications. In 2015 IEEE International Conference on Communications . London, UK, 1292--1297. Hossein Shokri-Ghadikolaei, Lazaros Gkatzikis, and Carlo Fischione. 2015. Beam-searching and Transmission Scheduling in Millimeter Wave Communications. In 2015 IEEE International Conference on Communications. London, UK, 1292--1297."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2869244"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of the 31st International Conference on Algorithmic Learning Theory (ALT '20)","volume":"117","author":"Trinh Cindy","year":"2020","unstructured":"Cindy Trinh , Emilie Kaufmann , Claire Vernade , and Richard Combes . 2020 . Solving Bernoulli Rank-One Bandits with Unimodal Thompson Sampling . In Proc. of the 31st International Conference on Algorithmic Learning Theory (ALT '20) , Vol. 117 . San Diego, CA, USA, 862--889. Cindy Trinh, Emilie Kaufmann, Claire Vernade, and Richard Combes. 2020. Solving Bernoulli Rank-One Bandits with Unimodal Thompson Sampling. In Proc. of the 31st International Conference on Algorithmic Learning Theory (ALT '20), Vol. 117. San Diego, CA, USA, 862--889."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419208"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922064"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900050"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2619705"},{"key":"e_1_3_2_1_41_1","volume-title":"Heath Jr","author":"Zhang Yi","year":"2021","unstructured":"Yi Zhang , Soumya Basu , Sanjay Shakkottai , and Robert W . Heath Jr . 2021 . MmWave Codebook Selection in Rapidly-Varying Channels via Multinomial Thompson Sampling. Technical Report. The University of Texas at Austin. Yi Zhang, Soumya Basu, Sanjay Shakkottai, and Robert W. Heath Jr. 2021. MmWave Codebook Selection in Rapidly-Varying Channels via Multinomial Thompson Sampling. Technical Report. The University of Texas at Austin."},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '19)","author":"Zhang Yi","unstructured":"Yi Zhang , Kartik Patel , Sanjay Shakkottai , and Robert W . Heath Jr. 2019. Side-Information-Aided Noncoherent Beam Alignment Design for Millimeter Wave Systems . In Proc. of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '19) . Catania, Italy, 341--350. Yi Zhang, Kartik Patel, Sanjay Shakkottai, and Robert W. Heath Jr. 2019. Side-Information-Aided Noncoherent Beam Alignment Design for Millimeter Wave Systems. In Proc. of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '19). Catania, Italy, 341--350."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380892"}],"event":{"name":"MobiHoc '21: The Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","location":"Shanghai China","acronym":"MobiHoc '21","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466772.3467044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466772.3467044","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466772.3467044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:57Z","timestamp":1750191537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466772.3467044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":42,"alternative-id":["10.1145\/3466772.3467044","10.1145\/3466772"],"URL":"https:\/\/doi.org\/10.1145\/3466772.3467044","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]},"assertion":[{"value":"2021-07-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}