{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:44:41Z","timestamp":1742399081902,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/icdcs.2017.303","type":"proceedings-article","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T16:43:53Z","timestamp":1500309833000},"page":"786-793","source":"Crossref","is-referenced-by-count":8,"title":["Networked Stochastic Multi-armed Bandits with Combinatorial Strategies"],"prefix":"10.1109","author":[{"given":"Shaojie","family":"Tang","sequence":"first","affiliation":[]},{"given":"Yaqin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Han","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Weili","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2302471"},{"journal-title":"Online Learning in Decentralized Multiuser Resource Sharing Problems","year":"2012","author":"tekin","key":"ref11"},{"journal-title":"Minimax Policies for Adversarial and Stochastic Bandits","year":"2009","author":"audibert","key":"ref12"},{"key":"ref13","first-page":"684","article-title":"From bandits to experts: On the value of side-observations","author":"mannor","year":"2011","journal-title":"Advances in neural information processing systems"},{"journal-title":"Leveraging side observations in stochastic bandits","year":"2012","author":"caron","key":"ref14"},{"journal-title":"Stochastic bandits with side observations on networks","year":"2014","author":"buccapatnam","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2181864"},{"journal-title":"Matroid bandits Fast combinatorial optimization with learning","year":"2014","author":"kveton","key":"ref17"},{"key":"ref18","article-title":"Tight regret bounds for stochastic combinatorial semi-bandits","author":"kveton","year":"2015","journal-title":"AISTATS"},{"key":"ref19","first-page":"2116","article-title":"Combinatorial bandits revisited","author":"combes","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0037(199603)27:2<133::AID-NET5>3.0.CO;2-L"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2487845"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.071349"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195616"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339540"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6761049"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1807342.1807349"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1987.1104491"},{"key":"ref20","first-page":"1","article-title":"Combinatorial multi-armed bandit and its extension to probabilistically triggered arms","volume":"17","author":"chen","year":"2016","journal-title":"Journal of Machine Learning Research"},{"key":"ref22","first-page":"379","article-title":"Combinatorial pure exploration of multi-armed bandits","author":"chen","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref21","first-page":"1651","article-title":"Combinatorial multi-armed bandit with general reward functions","author":"chen","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref23","first-page":"151","article-title":"Combinatorial multi-armed bandit: General framework, results and applications","author":"chen","year":"2013","journal-title":"Proceedings of The 30th InternationalConference on Machine Learning"}],"event":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","start":{"date-parts":[[2017,6,5]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2017,6,8]]}},"container-title":["2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7976702\/7979941\/07980021.pdf?arnumber=7980021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:44:08Z","timestamp":1502883848000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7980021\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icdcs.2017.303","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}