{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:07:11Z","timestamp":1772039231463,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Wireless Networking and Communications Group Industrial Affiliates Program"},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1910112, CNS-2107037, IIS-2112471"],"award-info":[{"award-number":["CNS-1910112, CNS-2107037, IIS-2112471"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Army Futures Command Grant","award":["W911NF-19-2-0333"],"award-info":[{"award-number":["W911NF-19-2-0333"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1145\/3492866.3549714","type":"proceedings-article","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T16:34:33Z","timestamp":1663778073000},"page":"111-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Online learning for multi-agent based resource allocation in weakly coupled wireless systems"],"prefix":"10.1145","author":[{"given":"Jianhan","family":"Song","sequence":"first","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Gustavo","family":"de Veciana","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Sanjay","family":"Shakkottai","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]}],"member":"320","published-online":{"date-parts":[[2022,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766739"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44848-9_5"},{"key":"e_1_3_2_1_3_1","unstructured":"Lilian Besson and Emilie Kaufmann. 2018. Multi-player bandits revisited. In Algorithmic Learning Theory. PMLR 56--92."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2020.1051"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.4306"},{"key":"e_1_3_2_1_6_1","volume-title":"Sanmay Das, and Brendan Juba.","author":"Chakraborty Mithun","year":"2017","unstructured":"Mithun Chakraborty, Kai Yee Phoebe Chua, Sanmay Das, and Brendan Juba. 2017. Coordinated Versus Decentralized Exploration In Multi-Agent Multi-Armed Bandits.. In IJCAI. 164--170."},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 3471--3481","author":"Chawla Ronshee","year":"2020","unstructured":"Ronshee Chawla, Abishek Sankararaman, Ayalvadi Ganesh, and Sanjay Shakkottai. 2020. The gossiping insert-eliminate algorithm for multi-agent bandits. In International Conference on Artificial Intelligence and Statistics. PMLR, 3471--3481."},{"key":"e_1_3_2_1_8_1","volume-title":"Conference on Learning Theory. PMLR, 998--1027","author":"Garivier Aur\u00e9lien","year":"2016","unstructured":"Aur\u00e9lien Garivier and Emilie Kaufmann. 2016. Optimal best arm identification with fixed confidence. In Conference on Learning Theory. PMLR, 998--1027."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1026"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2009.5449782"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523423"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2852361"},{"key":"e_1_3_2_1_13_1","volume-title":"International conference on machine learning. PMLR, 1301--1309","author":"Korda Nathan","year":"2016","unstructured":"Nathan Korda, Balazs Szorenyi, and Shuai Li. 2016. Distributed clustering of linear bandits in peer to peer networks. In International conference on machine learning. PMLR, 1301--1309."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798264"},{"key":"e_1_3_2_1_15_1","volume-title":"Bandit algorithms","author":"Lattimore Tor","unstructured":"Tor Lattimore and Csaba Szepesv\u00e1ri. 2020. Bandit algorithms. Cambridge University Press."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9048964"},{"key":"e_1_3_2_1_17_1","volume-title":"Decentralized Heterogeneous Multi-Player Multi-Armed Bandits with Non-Zero Rewards on Collisions","author":"Magesh Akshayaa","year":"2021","unstructured":"Akshayaa Magesh and Venugopal V Veeravalli. 2021. Decentralized Heterogeneous Multi-Player Multi-Armed Bandits with Non-Zero Rewards on Collisions. IEEE Transactions on Information Theory (2021)."},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 1211--1221","author":"Mehrabian Abbas","year":"2020","unstructured":"Abbas Mehrabian, Etienne Boursier, Emilie Kaufmann, and Vianney Perchet. 2020. A practical algorithm for multiplayer bandits when arm means vary among players. In International Conference on Artificial Intelligence and Statistics. PMLR, 1211--1221."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2863030"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Machine Learning. PMLR, 155--163","author":"Rosenski Jonathan","year":"2016","unstructured":"Jonathan Rosenski, Ohad Shamir, and Liran Szlak. 2016. Multi-player bandits-a musical chairs approach. In International Conference on Machine Learning. PMLR, 155--163."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/s120709055"},{"key":"e_1_3_2_1_22_1","volume-title":"Meta-scheduling for the wireless downlink through learning with bandit feedback","author":"Song Jianhan","year":"2021","unstructured":"Jianhan Song, Gustavo de Veciana, and Sanjay Shakkottai. 2021. Meta-scheduling for the wireless downlink through learning with bandit feedback. IEEE\/ACM Transactions on Networking (2021)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2021.102237"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2019.00017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.004"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2539923"},{"key":"e_1_3_2_1_27_1","volume-title":"Decentralized Wireless Resource Allocation with Graph Neural Networks. In 2020 54th Asilomar Conference on Signals, Systems, and Computers. IEEE, 299--303","author":"Wang Zhiyang","year":"2020","unstructured":"Zhiyang Wang, Mark Eisen, and Alejandro Ribeiro. 2020. Decentralized Wireless Resource Allocation with Graph Neural Networks. In 2020 54th Asilomar Conference on Signals, Systems, and Computers. IEEE, 299--303."},{"key":"e_1_3_2_1_28_1","volume-title":"Implications of decentralized Q-learning resource allocation in wireless networks. In 2017 ieee 28th annual international symposium on personal, indoor, and mobile radio communications (pimrc)","author":"Wilhelmi Francesc","unstructured":"Francesc Wilhelmi, Boris Bellalta, Cristina Cano, and Anders Jonsson. 2017. Implications of decentralized Q-learning resource allocation in wireless networks. In 2017 ieee 28th annual international symposium on personal, indoor, and mobile radio communications (pimrc). IEEE, 1--5."}],"event":{"name":"MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","location":"Seoul Republic of Korea","acronym":"MobiHoc '22","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492866.3549714","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492866.3549714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:27Z","timestamp":1750193307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549714"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":28,"alternative-id":["10.1145\/3492866.3549714","10.1145\/3492866"],"URL":"https:\/\/doi.org\/10.1145\/3492866.3549714","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]},"assertion":[{"value":"2022-10-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}