{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:39:20Z","timestamp":1777657160055,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-10-LABX-0070"],"award-info":[{"award-number":["ANR-10-LABX-0070"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,22]]},"DOI":"10.1145\/3479239.3485715","type":"proceedings-article","created":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T17:09:38Z","timestamp":1637168978000},"page":"135-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Improving the Spatial Reuse in IEEE 802.11ax WLANs"],"prefix":"10.1145","author":[{"given":"Anthony","family":"Bardou","sequence":"first","affiliation":[{"name":"Univ Lyon, ENS de Lyon, Universit\u00e9 Claude Bernard Lyon I, Inria, CNRS, LIP, Lyon, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Begin","sequence":"additional","affiliation":[{"name":"Univ Lyon, ENS de Lyon, Universit\u00e9 Claude Bernard Lyon I, Inria, CNRS, LIP, Lyon, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anthony","family":"Busson","sequence":"additional","affiliation":[{"name":"Univ Lyon, ENS de Lyon, Universit\u00e9 Claude Bernard Lyon I, Inria, CNRS, LIP, Lyon, France"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"11","article-title":"IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks--Specific Requirements - Part 11","volume":"802","year":"2021","unstructured":"2021 . IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks--Specific Requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802 . 11 -- 2020 (Revision of IEEE Std 802.11--2016) (2021). 2021. IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks--Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11--2020 (Revision of IEEE Std 802.11--2016) (2021).","journal-title":"IEEE Std"},{"key":"#cr-split#-e_1_3_2_1_2_1.1","doi-asserted-by":"crossref","unstructured":"2021. IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks--Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN. IEEE Std 802.11ax-2021 (Amendment to IEEE Std 802.11--2020) (2021) 1--767. https:\/\/doi.org\/10.1109\/IEEESTD.2021.9442429 10.1109\/IEEESTD.2021.9442429","DOI":"10.1109\/IEEESTD.2021.9442429"},{"key":"#cr-split#-e_1_3_2_1_2_1.2","doi-asserted-by":"crossref","unstructured":"2021. IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks--Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN. IEEE Std 802.11ax-2021 (Amendment to IEEE Std 802.11--2020) (2021) 1--767. https:\/\/doi.org\/10.1109\/IEEESTD.2021.9442429","DOI":"10.1109\/IEEESTD.2021.9442429"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Bardou T. Begin and A. Busson. 2021. Online repository for code. https:\/\/github.com\/abardou\/IMAB-SR-STA-802.11ax.  A. Bardou T. Begin and A. Busson. 2021. Online repository for code. https:\/\/github.com\/abardou\/IMAB-SR-STA-802.11ax."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"S. Barrachina-Mu\u00f1oz F. Wilhelmi and B. Bellalta. 2020. Online Primary Channel Selection for Dynamic Channel Bonding in High-Density WLANs. IEEE Wireless Communications Letters (2020).  S. Barrachina-Mu\u00f1oz F. Wilhelmi and B. Bellalta. 2020. Online Primary Channel Selection for Dynamic Channel Bonding in High-Density WLANs. IEEE Wireless Communications Letters (2020).","DOI":"10.1109\/LWC.2019.2952100"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Y. David and N. Shimkin. 2014. Infinitely Many-Armed Bandits with Unknown Value Distribution. (2014).  Y. David and N. Shimkin. 2014. Infinitely Many-Armed Bandits with Unknown Value Distribution. (2014).","DOI":"10.1007\/978-3-662-44848-9_20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.902687"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1197233"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2361917"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"J. Herzen R. Merz and P. Thiran. 2013. Distributed spectrum assignment for home WLANs. In IEEE INFOCOM.  J. Herzen R. Merz and P. Thiran. 2013. Distributed spectrum assignment for home WLANs. In IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2013.6566953"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"E. Khorov A. Kiryanov A. Lyakhov and G. Bianchi. 2018. A tutorial on IEEE 802.11 ax high efficiency WLANs. IEEE Communications Surveys & Tutorials (2018).  E. Khorov A. Kiryanov A. Lyakhov and G. Bianchi. 2018. A tutorial on IEEE 802.11 ax high efficiency WLANs. IEEE Communications Surveys & Tutorials (2018).","DOI":"10.1109\/COMST.2018.2871099"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"S. Lee T. Kim S. Lee K. Kim Y. H. Kim and N. Golmie. 2019. Dynamic Channel Bonding Algorithm for Densely Deployed 802.11ac Networks. IEEE Transactions on Communications (2019).  S. Lee T. Kim S. Lee K. Kim Y. H. Kim and N. Golmie. 2019. Dynamic Channel Bonding Algorithm for Densely Deployed 802.11ac Networks. IEEE Transactions on Communications (2019).","DOI":"10.1109\/TCOMM.2019.2944382"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.12.015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"A. L\u00f3pez-Ravent\u00f3s and B. Bellalta. 2020. Concurrent decentralized channel allocation and access point selection using Multi-Armed Bandits in Multi BSS WLANs. Computer Networks (2020).  A. L\u00f3pez-Ravent\u00f3s and B. Bellalta. 2020. Concurrent decentralized channel allocation and access point selection using Multi-Armed Bandits in Multi BSS WLANs. Computer Networks (2020).","DOI":"10.1016\/j.comnet.2020.107381"},{"key":"e_1_3_2_1_14_1","unstructured":"Aziz M. Anderton J. Kaufmann E. and Aslam J. 2018. Pure Exploration in Infinitely-Armed Bandit Models with Fixed-Confidence. (2018).  Aziz M. Anderton J. Kaufmann E. and Aslam J. 2018. Pure Exploration in Infinitely-Armed Bandit Models with Fixed-Confidence. (2018)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"A. Mishra V. Brik S. Banerjee A. Srinivasan and W. Arbaugh. 2006. A Client- Driven Approach for Channel Management in Wireless LANs. In IEEE INFOCOM.  A. Mishra V. Brik S. Banerjee A. Srinivasan and W. Arbaugh. 2006. A Client- Driven Approach for Channel Management in Wireless LANs. In IEEE INFOCOM.","DOI":"10.1109\/INFOCOM.2006.195"},{"key":"e_1_3_2_1_16_1","unstructured":"ns3 2021. The Network Simulator ns-3. https:\/\/www.nsnam.org\/.  ns3 2021. The Network Simulator ns-3. https:\/\/www.nsnam.org\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"T. Ropitault and N. Golmie. 2017. ETP algorithm: Increasing spatial reuse in wireless LANs dense environment using ETX. In IEEE PIMRC.  T. Ropitault and N. Golmie. 2017. ETP algorithm: Increasing spatial reuse in wireless LANs dense environment using ETX. In IEEE PIMRC.","DOI":"10.1109\/PIMRC.2017.8292351"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"I. Selinis K. Katsaros S. Vahid and R. Tafazolli. 2018. Control OBSS\/PD Sensitivity Threshold for IEEE 802.11ax BSS Color. In IEEE PIMRC.  I. Selinis K. Katsaros S. Vahid and R. Tafazolli. 2018. Control OBSS\/PD Sensitivity Threshold for IEEE 802.11ax BSS Color. In IEEE PIMRC.","DOI":"10.1109\/PIMRC.2018.8580778"},{"key":"e_1_3_2_1_19_1","unstructured":"A. Shipra and G. Navin. 2012. Analysis of Thompson Sampling for the Multi- Armed Bandit problem. (2012).  A. Shipra and G. Navin. 2012. Analysis of Thompson Sampling for the Multi- Armed Bandit problem. (2012)."},{"key":"e_1_3_2_1_20_1","unstructured":"A. Shipra and G. Navin. 2013. Further Optimal Regret Bounds for Thompson Sampling. (2013).  A. Shipra and G. Navin. 2013. Further Optimal Regret Bounds for Thompson Sampling. (2013)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"M. Stojanova T. Begin and A. Busson. 2019. Conflict graph-based model for IEEE 802.11 networks: A Divide-and-Conquer approach. Performance Evaluation (2019).  M. Stojanova T. Begin and A. Busson. 2019. Conflict graph-based model for IEEE 802.11 networks: A Divide-and-Conquer approach. Performance Evaluation (2019).","DOI":"10.1016\/j.peva.2018.11.002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3312046"},{"key":"e_1_3_2_1_23_1","volume-title":"On the Likelihood that One Unknown Probability Exceeds Another in View of the Evidence of Two Samples. Biometrika","author":"Thompson","year":"1933","unstructured":"W. R. Thompson . 1933. On the Likelihood that One Unknown Probability Exceeds Another in View of the Evidence of Two Samples. Biometrika ( 1933 ). W. R. Thompson. 1933. On the Likelihood that One Unknown Probability Exceeds Another in View of the Evidence of Two Samples. Biometrika (1933)."},{"key":"e_1_3_2_1_24_1","unstructured":"Y. Wang J-Y. Audibert and R. Munos. 2009. Algorithms for Infinitely Many- Armed Bandits. (2009).  Y. Wang J-Y. Audibert and R. Munos. 2009. Algorithms for Infinitely Many- Armed Bandits. (2009)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"F. Wilhelmi S. Barrachina-Mu\u00f1oz C. Cano B. Bellalta A. Jonsson and G. Neu. 2018. Potential and Pitfalls of Multi-Armed Bandits for Decentralized Spatial Reuse in WLANs. CoRR (2018).  F. Wilhelmi S. Barrachina-Mu\u00f1oz C. Cano B. Bellalta A. Jonsson and G. Neu. 2018. Potential and Pitfalls of Multi-Armed Bandits for Decentralized Spatial Reuse in WLANs. CoRR (2018).","DOI":"10.1016\/j.jnca.2018.11.006"},{"key":"e_1_3_2_1_26_1","unstructured":"F. Wilhelmi C. Cano G. Neu B. Bellalta A. Jonsson and S. Barrachina-Mu\u00f1oz. 2017. Collaborative Spatial Reuse in Wireless Networks via Selfish Multi-Armed Bandits. CoRR (2017).  F. Wilhelmi C. Cano G. Neu B. Bellalta A. Jonsson and S. Barrachina-Mu\u00f1oz. 2017. Collaborative Spatial Reuse in Wireless Networks via Selfish Multi-Armed Bandits. CoRR (2017)."},{"key":"e_1_3_2_1_27_1","unstructured":"K. Youngsoo Y. Jeonggyun and C. Sunghyun. 2004. SP-TPC: a self-protective energy efficient communication strategy for IEEE 802.11 WLANs. In IEEE VTC.  K. Youngsoo Y. Jeonggyun and C. Sunghyun. 2004. SP-TPC: a self-protective energy efficient communication strategy for IEEE 802.11 WLANs. In IEEE VTC."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1072480.1072491"}],"event":{"name":"MSWiM '21: 24th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Alicante Spain","acronym":"MSWiM '21","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 24th International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479239.3485715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479239.3485715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:51Z","timestamp":1750191531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479239.3485715"}},"subtitle":["A Multi-Armed Bandit Approach"],"short-title":[],"issued":{"date-parts":[[2021,11,22]]},"references-count":29,"alternative-id":["10.1145\/3479239.3485715","10.1145\/3479239"],"URL":"https:\/\/doi.org\/10.1145\/3479239.3485715","relation":{},"subject":[],"published":{"date-parts":[[2021,11,22]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}