{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T21:06:23Z","timestamp":1761253583400,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,18]]},"DOI":"10.23919\/wiopt52861.2021.9589673","type":"proceedings-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T23:23:56Z","timestamp":1636413836000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Aging Wireless Bandits: Regret Analysis and Order-Optimal Learning Algorithm"],"prefix":"10.23919","author":[{"given":"Eray Unsal","family":"Atay","sequence":"first","affiliation":[]},{"given":"Igor","family":"Kadota","sequence":"additional","affiliation":[]},{"given":"Eytan","family":"Modiano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2020.1995"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437817"},{"key":"ref12","article-title":"Control of wireless networks under uncertain state information","author":"stahlbuhk","year":"2018","journal-title":"PhD Dissertation MIT"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873606"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437712"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2936199"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2960346"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919842"},{"key":"ref18","article-title":"Age-of-information bandits","author":"bhandari","year":"2020","journal-title":"Proc of IEEE WiOpt"},{"article-title":"Correlated age-of-information bandits","year":"2020","author":"juneja","key":"ref19"},{"key":"ref4","article-title":"The KL-UCB algorithm for bounded stochastic bandits and beyond","author":"garivier","year":"2011","journal-title":"Proc of COLT"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref5","article-title":"Analysis of thompson sampling for the multiarmed bandit problem","author":"agrawal","year":"2012","journal-title":"Proc of COLT"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1561\/2200000068"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2200\/S00954ED2V01Y201909CNT023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/1300000060"},{"article-title":"Decentralized age-of-information bandits","year":"2020","author":"prasad","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2012.6310931"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2533395"},{"key":"ref24","article-title":"Minimizing the age of information in wireless networks with stochastic arrivals","author":"kadota","year":"2019","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2915521"},{"key":"ref25","article-title":"Further optimal regret bounds for thompson sampling","author":"agrawal","year":"2013","journal-title":"Proc of AISTATS"}],"event":{"name":"2021 19th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt)","start":{"date-parts":[[2021,10,18]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2021,10,21]]}},"container-title":["2021 19th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9588334\/9589050\/09589673.pdf?arnumber=9589673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T22:38:46Z","timestamp":1647297526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9589673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,18]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/wiopt52861.2021.9589673","relation":{},"subject":[],"published":{"date-parts":[[2021,10,18]]}}}