{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T16:43:34Z","timestamp":1726245814867},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031477140"},{"type":"electronic","value":"9783031477157"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47715-7_39","type":"book-chapter","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T15:02:44Z","timestamp":1706540564000},"page":"571-588","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Efficient Edge Learning with\u00a0Limited Storage Resource: Bandit-Based Training Data Retrieval in\u00a0AIoT"],"prefix":"10.1007","author":[{"given":"Jing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Siyuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,30]]},"reference":[{"key":"39_CR1","unstructured":"Agrawal, S., Goyal, N.: Analinproceedingsysis of Thompson sampling for the multi-armed bandit problem. In: Conference on Learning Theory. JMLR Workshop and Conference Proceedings, pp. 39\u20131 (2012)"},{"issue":"2","key":"39_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.future.2019.02.005","volume":"96","author":"J Azar","year":"2019","unstructured":"Azar, J., Makhoul, A., Barhamgi, M., Couturier, R.: An energy efficient IoT data compression approach for edge machine learning. Futur. Gener. Comput. Syst. 96, 168\u2013175 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"39_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MCOM.2019.1800644","volume":"57","author":"Q Cui","year":"2019","unstructured":"Cui, Q., Gong, Z., Ni, W., Hou, Y., Chen, X., Tao, X., Zhang, P.: Stochastic online learning for mobile edge computing: learning from changes. IEEE Commun. Mag. 57(3), 63\u201369 (2019)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"39_CR5","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/2318857.2254810","volume":"40","author":"M Gallo","year":"2012","unstructured":"Gallo, M., Kauffmann, B., Muscariello, L., Simonian, A., Tanguy, C.: Performance evaluation of the random replacement policy for networks of caches. ACM SIGMETRICS Perform. Eval. Rev. 40(1), 395\u2013396 (2012)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"issue":"9","key":"39_CR6","first-page":"1823","volume":"57","author":"M Huirong","year":"2020","unstructured":"Huirong, M., Chen, X., Zhi, Z., Shuai, Yu.: Dynamic task offloading for mobile edge computing driven by green energy. Comput. Res. Dev. 57(9), 1823\u20131838 (2020)","journal-title":"Comput. Res. Dev."},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Lang, K.: Newsweeder: Learning to filter netnews. In: Machine Learning Proceedings 1995, pp. 331\u2013339. Elsevier (1995)","DOI":"10.1016\/B978-1-55860-377-6.50048-7"},{"key":"39_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116252","volume":"191","author":"C Li","year":"2022","unstructured":"Li, C., Qianqian, C., Luo, Y.: Low-latency edge cooperation caching based on base station cooperation in SDN based MEC. Expert Syst. Appl. 191, 116252 (2022)","journal-title":"Expert Syst. Appl."},{"key":"39_CR9","unstructured":"Ling, W., Chuge, W., Wenhui, F.: A review of edge computing resource allocation and task scheduling optimization. J. Syst. Simul. 33(3), 509 (2021)"},{"issue":"3","key":"39_CR10","doi-asserted-by":"publisher","first-page":"271","DOI":"10.26599\/TST.2018.9010124","volume":"24","author":"L Liu","year":"2019","unstructured":"Liu, L., Chen, X., Zhaoming, L., Wang, L., Wen, X.: Mobile-edge computing framework with data compression for wireless network in energy internet. Tsinghua Sci. Technol. 24(3), 271\u2013280 (2019)","journal-title":"Tsinghua Sci. Technol."},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Y., He, Q., Zheng, D., Xia, X., Chen, F., Zhang, B.: Data caching optimization in the edge computing environment. IEEE Trans. Ser. Comput. (2020)","DOI":"10.1109\/ICWS.2019.00027"},{"key":"39_CR12","doi-asserted-by":"publisher","first-page":"49007","DOI":"10.1109\/ACCESS.2021.3068753","volume":"9","author":"L Shaofei","year":"2021","unstructured":"Shaofei, L., Xia, Q., Tang, X., Zhang, X., Yingping, L., She, J.: A reliable data compression scheme in sensor-cloud systems based on edge computing. IEEE Access 9, 49007\u201349015 (2021)","journal-title":"IEEE Access"},{"issue":"11","key":"39_CR13","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/JPROC.2019.2941458","volume":"107","author":"J Park","year":"2019","unstructured":"Park, J., Samarakoon, S., Bennis, M., Debbah, M.: Wireless network intelligence at the edge. Proc. IEEE 107(11), 2204\u20132239 (2019)","journal-title":"Proc. IEEE"},{"issue":"14","key":"39_CR14","doi-asserted-by":"publisher","first-page":"5425","DOI":"10.3390\/s22145425","volume":"22","author":"S Qiu","year":"2022","unstructured":"Qiu, S., Li, A.: Application of chaos mutation adaptive sparrow search algorithm in edge data compression. Sensors 22(14), 5425 (2022)","journal-title":"Sensors"},{"issue":"2","key":"39_CR15","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/MNET.011.2000478","volume":"35","author":"A Tak","year":"2021","unstructured":"Tak, A., Cherkaoui, S.: Federated edge learning: design issues and challenges. IEEE Netw. 35(2), 252\u2013258 (2021)","journal-title":"IEEE Netw."},{"key":"39_CR16","unstructured":"Tian, Y., Jun, Y.: A deep reinforcement learning method for offloading decision and resource allocation in MEC. Comput. Eng. (2021)"},{"key":"39_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109344","volume":"252","author":"G Wang","year":"2022","unstructured":"Wang, G., Li, C., Huang, Y., Wang, X., Luo, Y.: Smart contract-based caching and data transaction optimization in mobile edge computing. Knowl.-Based Syst. 252, 109344 (2022)","journal-title":"Knowl.-Based Syst."},{"issue":"10","key":"39_CR18","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/LCOMM.2020.2998474","volume":"24","author":"J-B Wang","year":"2020","unstructured":"Wang, J.-B., Zhang, J., Ding, C., Zhang, H., Lin, M., Wang, J.: Joint optimization of transmission bandwidth allocation and data compression for mobile-edge computing systems. IEEE Commun. Lett. 24(10), 2245\u20132249 (2020)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"39_CR19","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TPDS.2020.3016344","volume":"32","author":"X Xia","year":"2020","unstructured":"Xia, X., Chen, F., He, Q., Grundy, J., Abdelrazek, M., Jin, H.: Online collaborative data caching in edge computing. IEEE Trans. Parallel Distrib. Syst. 32(2), 281\u2013294 (2020)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"39_CR20","unstructured":"Xia, Y., Li, H., Qin, T., Yu, N., Liu, T-Y.: Thompson sampling for budgeted multi-armed bandits. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhu, Q.: Distributed mobile devices caching over edge computing wireless networks. In: 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 127\u2013132. IEEE (2017)","DOI":"10.1109\/INFCOMW.2017.8116364"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47715-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T15:07:29Z","timestamp":1706540849000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47715-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031477140","9783031477157"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47715-7_39","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys12023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}