{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:17:34Z","timestamp":1758845854761,"version":"3.41.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T00:00:00Z","timestamp":1452211200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Brac University of Bangladesh"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-015-0515-y","type":"journal-article","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T11:45:04Z","timestamp":1452253504000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Resource-aware task scheduling by an adversarial bandit solver method in wireless sensor networks"],"prefix":"10.1186","volume":"2016","author":[{"given":"Muhidul Islam","family":"Khan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,8]]},"reference":[{"key":"515_CR1","doi-asserted-by":"publisher","unstructured":"L Xiang, J Luo, A Vasilakos, \u201cCompressed data aggregation for energy efficient wireless sensor networks,\u201d in Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual IEEE Communications Society Conference on, june 2011, 46\u201354 (2011).","DOI":"10.1109\/SAHCN.2011.5984932"},{"issue":"3","key":"515_CR2","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TNSM.2014.2346080","volume":"11","author":"Y Song","year":"2014","unstructured":"Y Song, L Liu, H Ma, AV Vasilakos, A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 11(3), 417\u2013430 (2014).","journal-title":"IEEE Trans. Netw. Serv. Manag"},{"issue":"3","key":"515_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/0925-2312(94)00027-P","volume":"7","author":"AV Vasilakos","year":"1995","unstructured":"AV Vasilakos, GI Papadimitriou, A new approach to the design of reinforcement schemes for learning automata: stochastic estimator learning algorithm. Neurocomputing. 7(3), 275\u2013297 (1995).","journal-title":"Neurocomputing"},{"issue":"3","key":"515_CR4","first-page":"819","volume":"64","author":"L Liu","year":"2015","unstructured":"L Liu, Y Song, H Zhang, H Ma, AV Vasilakos, Physarum optimization: a biology-inspired algorithm for the Steiner tree problem in networks. IEEE Trans. Comput. 64(3), 819\u2013832 (2015).","journal-title":"IEEE Trans. Comput"},{"key":"515_CR5","doi-asserted-by":"crossref","unstructured":"H Saad, A Mohamed, T ElBatt, Cooperative Q-learning techniques for distributed online power allocation in femtocell networks. Wirel. Commun. Mob. Comput (2014). doi: 10.1002\/wcm.2470 .","DOI":"10.1002\/wcm.2470"},{"key":"515_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2003","unstructured":"P Auer, NC Bianchi, Y Freund, RE Schapire, The nonstochastic multiarmed bandit problem. SIAM J. Comput.32:, 48\u201377 (2003). doi: 10.1137\/S0097539701398375 .","journal-title":"SIAM J. Comput."},{"key":"515_CR7","first-page":"1","volume-title":"Proceedings of IEEE Mobile Adhoc and Sensor Systems","author":"K Shah","year":"2007","unstructured":"K Shah, M Kumar, in Proceedings of IEEE Mobile Adhoc and Sensor Systems. Distributed Independent Reinforcement Learning (DIRL) Approach to Resource Management in Wireless Sensor Networks (IEEEPisa, Italy, 2007), pp. 1\u20139."},{"key":"515_CR8","first-page":"895","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops","author":"MI Khan","year":"2012","unstructured":"MI Khan, B Rinner, in Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops. Resource Coordination in Wireless Sensor Networks by Cooperative Reinforcement Learning (IEEELugano, Switzerland, 2012), pp. 895\u2013900."},{"key":"515_CR9","first-page":"871","volume-title":"Proceedings of the IEEE International Conference on Communications Workshops","author":"M Khan","year":"2014","unstructured":"M Khan, B Rinner, in Proceedings of the IEEE International Conference on Communications Workshops. Energy-Aware Task Scheduling in Wireless Sensor Networks Based on Cooperative Reinforcement Learning (IEEESydney, Australia, 2014), pp. 871\u2013877."},{"key":"515_CR10","first-page":"230","volume-title":"Proceedings of the ACM Conference on Embedded Networked Sensor Systems","author":"C Frank","year":"2005","unstructured":"C Frank, K R\u00f6mer, in Proceedings of the ACM Conference on Embedded Networked Sensor Systems. Algorithms for Generic Role Assignments in Wireless Sensor Networks (IEEESan Diego, California, 2005), pp. 230\u2013242."},{"key":"515_CR11","first-page":"1567","volume-title":"Proceedings of the INFOCOM\u201902","author":"JHW Ye","year":"2002","unstructured":"JHW Ye, D Estrin, in Proceedings of the INFOCOM\u201902. An Energy-Efficient MAC Protocol for Wireless Sensor Networks (IEEENew York, USA, 2002), pp. 1567\u20131576."},{"key":"515_CR12","first-page":"210","volume-title":"Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference","author":"Y Tian","year":"2005","unstructured":"Y Tian, E Ekici, F Ozguner, in Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference. Energy-constrained Task Mapping and Scheduling in Wireless Sensor Networks (IEEEWashington, DC, 2005), pp. 210\u2013218."},{"key":"515_CR13","doi-asserted-by":"crossref","unstructured":"T He, S Krishnamurthy, JA Stankovic, T Abdelzaher, L Luo, R Stoleru, T Yan, L Gu, in In Mobisys. Energy-Efficient Surveillance System Using Wireless Sensor Networks (ACM Press, 2004), pp. 270\u2013283.","DOI":"10.1145\/990064.990096"},{"key":"515_CR14","doi-asserted-by":"publisher","first-page":"6533","DOI":"10.3390\/s110706533","volume":"11","author":"W Guo","year":"2011","unstructured":"W Guo, N Xiong, H-C Chao, S Hussain, G Chen, Design and analysis of self adapted task scheduling strategies in WSN. Sensors J. 11:, 6533\u20136554 (2011). doi: 10.3390\/s110706533 .","journal-title":"Sensors J"},{"issue":"3","key":"515_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2700264","volume":"11","author":"X Xu","year":"2015","unstructured":"X Xu, R Ansari, A Khokhar, AV Vasilakos, Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Trans. Sens. Netw. 11(3), 1\u201325 (2015).","journal-title":"ACM Trans. Sens. Netw"},{"key":"515_CR16","first-page":"35","volume-title":"Proceedings of the Euromicro Conference on Real-Time Systems","author":"S Giannecchini","year":"2004","unstructured":"S Giannecchini, M Caccamo, CS Shih, in Proceedings of the Euromicro Conference on Real-Time Systems. Collaborative Resource Allocation in Wireless Sensor Networks (IEEERennes, France, 2004), pp. 35\u201344."},{"key":"515_CR17","doi-asserted-by":"crossref","unstructured":"T Meng, F Wu, Z Yang, G Chen, AV Vasilakos, Spatial reusability-aware routing in multi-hop wireless networks. IEEE Trans. Comput., 1\u201313 (2015). doi: 10.1109\/TC.2015.2417543 .","DOI":"10.1109\/TC.2015.2417543"},{"issue":"1\u20134","key":"515_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/A:1023426501170","volume":"22","author":"B Krishnamachari","year":"2003","unstructured":"B Krishnamachari, S Wicker, R Bejar, C Fernandez, \u201cOn the complexity of distributed self-configuration in wireless networks\u201d. J. Telecommun. Syst. 22(1\u20134), 33\u201359 (2003).","journal-title":"J. Telecommun. Syst."},{"issue":"9","key":"515_CR19","first-page":"22","volume":"61","author":"C Busch","year":"2014","unstructured":"C Busch, R Kannan, AV Vasilakos, Approximating congestion + dilation in networks via \u201cQuality of Routing\u201d games. Int. J. Distrib. Wirel. Sens. Netw. 61(9), 22 (2014).","journal-title":"Int. J. Distrib. Wirel. Sens. Netw"},{"key":"515_CR20","first-page":"84","volume-title":"Proceedings of the IEEE Systems and Information Engineering Design Symposium","author":"S Dhanani","year":"2006","unstructured":"S Dhanani, J Arseneau, A Weatherton, B Caswell, N Singh, S Patek, in Proceedings of the IEEE Systems and Information Engineering Design Symposium. A Comparison of Utility Based Information Management Policies in Sensor Networks (IEEECharlottesville, Virginia USA, 2006), pp. 84\u201389."},{"key":"515_CR21","doi-asserted-by":"crossref","unstructured":"P Li, S Guo, S Yu, AV Vasilakos, in Proceedings of the IEEE INFOCOM. CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding (Orlando, FL, 2012), pp. 100\u2013108.","DOI":"10.1109\/INFCOM.2012.6195456"},{"key":"515_CR22","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"1998","unstructured":"RS Sutton, AG Barto, Reinforcement Learning: An Introduction (MIT Press, Cambridge, Massachusetts, United States, 1998)."},{"key":"515_CR23","doi-asserted-by":"crossref","unstructured":"MI Khan, B Rinner, Performance analysis of resource aware task scheduling methodologies in wireless sensor networks. International Journal of Distributed Sensor Networks, Hindawi, Volume 2014, 11 (2014).","DOI":"10.1155\/2014\/765182"},{"key":"515_CR24","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.jnca.2011.08.007","volume":"35","author":"KLA Yau","year":"2012","unstructured":"KLA Yau, P Komisarczuk, PD Teal, Reinforcement learning for context awareness and intelligence in wireless networks: review, new features and open issues. J. Netw. Comput. Appl.35:, 253\u2013267 (2012).","journal-title":"J. Netw. Comput. Appl."},{"key":"515_CR25","first-page":"143","volume-title":"Proceedings of the Workshop on Mobile and Ad Hoc Networking and Computing","author":"J Byers","year":"2000","unstructured":"J Byers, G Nasser, in Proceedings of the Workshop on Mobile and Ad Hoc Networking and Computing. Utility Based Decision making in Wireless Sensor Networks (IEEEBoston, MA, 2000), pp. 143\u2013144."},{"key":"515_CR26","volume-title":"Advances in Artificial Intelligence","author":"RAC Bianchi","year":"2004","unstructured":"RAC Bianchi, CHC Ribeiro, AHR Costa, Advances in Artificial Intelligence (Springer, Berlin, Germany, 2004)."},{"key":"515_CR27","volume-title":"Introduction to Linear Regression Analysis","author":"DC Montgomery","year":"2007","unstructured":"DC Montgomery, EA Peck, GG Vining, Introduction to Linear Regression Analysis (Wiley, Hoboken, New Jersey, United States, 2007)."},{"key":"515_CR28","unstructured":"N Bery, Linear regression. Technical report. DataGenetics (2009)."},{"key":"515_CR29","volume-title":"Theory and Problems of Probability and Statistics","author":"MR Spiegel","year":"1992","unstructured":"MR Spiegel, Theory and Problems of Probability and Statistics (McGraw-Hill, New York City, New York, United States, 1992)."},{"key":"515_CR30","first-page":"47","volume":"10","author":"T Abbes","year":"2012","unstructured":"T Abbes, S Mohamed, K Bouabdellah, Impact of model mobility in ad hoc routing protocols. Comput. Netw. Inf. Secur. 10:, 47\u201354 (2012).","journal-title":"Comput. Netw. Inf. Secur"},{"issue":"2","key":"515_CR31","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2530001","volume":"10","author":"L Esterle","year":"2014","unstructured":"L Esterle, PR Lewis, X Yao, B Rinner, Socio-economic vision graph generation and handover in distributed smart camera networks. ACM Trans. Sens. Netw. 10(2), 24 (2014).","journal-title":"ACM Trans. Sens. Netw"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0515-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-015-0515-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0515-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0515-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T02:39:59Z","timestamp":1748745599000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-015-0515-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,8]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["515"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0515-y","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,1,8]]},"article-number":"10"}}