{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:20:55Z","timestamp":1720624855557},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1016\/j.adhoc.2023.103283","type":"journal-article","created":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T08:18:35Z","timestamp":1694247515000},"page":"103283","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Massive multi-player multi-armed bandits for IoT networks: An application on LoRa networks"],"prefix":"10.1016","volume":"151","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8451-1358","authenticated-orcid":false,"given":"Hiba","family":"Dakdouk","sequence":"first","affiliation":[]},{"given":"Rapha\u00ebl","family":"F\u00e9raud","sequence":"additional","affiliation":[]},{"given":"Nad\u00e8ge","family":"Varsier","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Maill\u00e9","sequence":"additional","affiliation":[]},{"given":"Romain","family":"Laroche","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2023.103283_b1","series-title":"Return on IoT: Dealing with the IoT skills gap","author":"Newman","year":"2019"},{"issue":"3","key":"10.1016\/j.adhoc.2023.103283_b2","doi-asserted-by":"crossref","first-page":"46","DOI":"10.3390\/fi12030046","article-title":"LPWAN technologies: Emerging application characteristics, requirements, and design considerations","volume":"12","author":"Chaudhari","year":"2020","journal-title":"Future Internet"},{"key":"10.1016\/j.adhoc.2023.103283_b3","series-title":"LoRa alliance","year":"2021"},{"issue":"2\u20133","key":"10.1016\/j.adhoc.2023.103283_b4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"10.1016\/j.adhoc.2023.103283_b5","series-title":"International Conference on Cognitive Radio Oriented Wireless Networks","first-page":"173","article-title":"Multi-armed bandit learning in IoT networks: Learning helps even in non-stationary settings","author":"Bonnefoi","year":"2017"},{"issue":"11","key":"10.1016\/j.adhoc.2023.103283_b6","doi-asserted-by":"crossref","first-page":"5667","DOI":"10.1109\/TSP.2010.2062509","article-title":"Distributed learning in multi-armed bandit with multiple players","volume":"58","author":"Liu","year":"2010","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.adhoc.2023.103283_b7","doi-asserted-by":"crossref","unstructured":"A. Anandkumar, N. Michael, A. Tang, Opportunistic Spectrum Access with Multiple Users: Learning under Competition, in: Proceedings IEEE INFOCOM, 2010.","DOI":"10.1109\/INFCOM.2010.5462144"},{"key":"10.1016\/j.adhoc.2023.103283_b8","series-title":"ECML PKDD","article-title":"Concurrent bandits and cognitive radio networks","author":"Avner","year":"2014"},{"key":"10.1016\/j.adhoc.2023.103283_b9","unstructured":"N. Nayyar, D. Katathil, R. Jain, On Regret-Optimal Learning in Decentralized Multi-player Multi-armed Bandits, in: EEE Transactions on Control of Network Systems, 2015."},{"key":"10.1016\/j.adhoc.2023.103283_b10","series-title":"International Conference on Machine Learning","first-page":"155","article-title":"Multi-player bandits\u2013A musical chairs approach","author":"Rosenski","year":"2016"},{"key":"10.1016\/j.adhoc.2023.103283_b11","series-title":"Multi-player bandits: A trekking approach","author":"Hanawal","year":"2018"},{"key":"10.1016\/j.adhoc.2023.103283_b12","series-title":"Advances in Neural Information Processing Systems, Vol. 32","first-page":"12048","article-title":"SIC-MMAB: Synchronisation involves communication in multiplayer multi-armed bandits","author":"Boursier","year":"2019"},{"key":"10.1016\/j.adhoc.2023.103283_b13","series-title":"International Conference on Artificial Intelligence and Statistics","first-page":"4120","article-title":"Optimal algorithms for multiplayer multi-armed bandits","author":"Wang","year":"2020"},{"key":"10.1016\/j.adhoc.2023.103283_b14","unstructured":"E. Boursier, V. Perchet, E. Kaufmann, A. Mehrabian, A Practical Algorithm for Multiplayer Bandits when Arm Means Vary Among Players, in: AISTATS, 2020."},{"key":"10.1016\/j.adhoc.2023.103283_b15","doi-asserted-by":"crossref","unstructured":"R. Kerkouche, R. Alami, R. F\u00e9raud, N. Varsier, P. Maill\u00e9, Node-based optimization of LoRa transmissions with Multi-Armed Bandit algorithms, in: 25th International Conference on Telecommunications, ICT, 2018.","DOI":"10.1109\/ICT.2018.8464949"},{"issue":"12","key":"10.1016\/j.adhoc.2023.103283_b16","doi-asserted-by":"crossref","first-page":"12415","DOI":"10.1109\/JSEN.2022.3174663","article-title":"Upper confidence bound based communication parameters selection to improve scalability of LoRa@FIIT communication","volume":"22","author":"Valach","year":"2022","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.adhoc.2023.103283_b17","doi-asserted-by":"crossref","unstructured":"H. Dakdouk, E. Tarazona, R. Alami, R. F\u00e9raud, G.Z. Papadopoulos, P. Maill\u00e9, Reinforcement Learning Techniques for Optimized Channel Hopping in IEEE 802.15.4-TSCH Networks, in: Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWIM \u201918, 2018.","DOI":"10.1145\/3242102.3242110"},{"key":"10.1016\/j.adhoc.2023.103283_b18","unstructured":"L. Besson, E. Kaufmann, Multi-Player Bandits Revisited, in: Proceedings of Algorithmic Learning Theory, Vol. 83, 2018, pp. 56\u201392."},{"key":"10.1016\/j.adhoc.2023.103283_b19","series-title":"Asian Conference on Machine Learning","first-page":"193","article-title":"Collaborative exploration in stochastic multi-player bandits","author":"Dakdouk","year":"2020"},{"key":"10.1016\/j.adhoc.2023.103283_b20","series-title":"Data Networks, Vol. 2","author":"Bertsekas","year":"1992"},{"key":"10.1016\/j.adhoc.2023.103283_b21","series-title":"Proceedings of the 42nd Annual Allerton Conference","article-title":"Distributed algorithms for max-min fair rate allocation in Aloha networks","author":"Wang","year":"2004"},{"issue":"11","key":"10.1016\/j.adhoc.2023.103283_b22","doi-asserted-by":"crossref","first-page":"2276","DOI":"10.1109\/JSAC.2013.131109","article-title":"Game theoretic aspects of the multi-channel ALOHA protocol in cognitive radio networks","volume":"31","author":"Cohen","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.adhoc.2023.103283_b23","series-title":"Neural Network Learning: Theoretical Foundations","author":"Anthony","year":"1999"},{"key":"10.1016\/j.adhoc.2023.103283_b24","series-title":"2017 IEEE 11th International Conference on Application of Information and Communication Technologies","first-page":"1","article-title":"More efficient IoT communication through LoRa network with LoRa@FIIT and STIOT protocols","author":"Pere\u0161\u00edni","year":"2017"},{"issue":"9","key":"10.1016\/j.adhoc.2023.103283_b25","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.3390\/s16091466","article-title":"A study of LoRa: Long range & low power networks for the Internet of Things","volume":"16","author":"Augustin","year":"2016","journal-title":"Sensors"},{"key":"10.1016\/j.adhoc.2023.103283_b26","article-title":"LoRaWANtm specification, V1.0.3","author":"Sornin","year":"2018"},{"key":"10.1016\/j.adhoc.2023.103283_b27","series-title":"Regret analysis of stochastic and nonstochastic multi-armed bandit problems","author":"Bubeck","year":"2012"},{"key":"10.1016\/j.adhoc.2023.103283_b28","unstructured":"R. F\u00e9raud, R. Alami, R. Laroche, Decentralized Exploration in Multi-Armed Bandits, in: ICML, 2019."},{"key":"10.1016\/j.adhoc.2023.103283_b29","doi-asserted-by":"crossref","unstructured":"C. Shi, C. Shen, Federated multi-armed bandits, in: Proceedings of the 35th AAAI Conference on Artificial Intelligence, AAAI, 2021.","DOI":"10.1609\/aaai.v35i11.17156"},{"key":"10.1016\/j.adhoc.2023.103283_b30","series-title":"Advances in Neural Information Processing Systems","article-title":"On explore-then-commit strategies","author":"Garivier","year":"2016"},{"issue":"1","key":"10.1016\/j.adhoc.2023.103283_b31","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1137\/S0097539701398375","article-title":"The nonstochastic multiarmed bandit problem","volume":"32","author":"Auer","year":"2002","journal-title":"SIAM J. Comput."},{"key":"10.1016\/j.adhoc.2023.103283_b32","series-title":"How does LoRaWAN adaptive data rate work?","author":"Ghoslya","year":"2021"},{"key":"10.1016\/j.adhoc.2023.103283_b33","series-title":"Understanding the LoRa adaptive data rate","author":"Semtech","year":"2019"},{"issue":"2","key":"10.1016\/j.adhoc.2023.103283_b34","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/LWC.2018.2873705","article-title":"LoRa throughput analysis with imperfect spreading factor orthogonality","volume":"8","author":"Waret","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"9","key":"10.1016\/j.adhoc.2023.103283_b35","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOM.2017.1600613","article-title":"Understanding the limits of LoRaWAN","volume":"55","author":"Adelantado","year":"2017","journal-title":"IEEE Commun. Mag."},{"issue":"18","key":"10.1016\/j.adhoc.2023.103283_b36","doi-asserted-by":"crossref","first-page":"5044","DOI":"10.3390\/s20185044","article-title":"A survey on adaptive data rate optimization in LoRaWAN: Recent solutions and major challenges","volume":"20","author":"Kufakunesu","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.adhoc.2023.103283_b37","series-title":"Semtech: Camarillo, CA, USA, 2016","article-title":"LoRaWAN \u2013 Simple rate adaptation recommended algorithm","author":"Corporation","year":"2021"},{"issue":"4","key":"10.1016\/j.adhoc.2023.103283_b38","doi-asserted-by":"crossref","first-page":"2670","DOI":"10.1109\/JIOT.2020.3020189","article-title":"A novel collision-aware adaptive data rate algorithm for LoRaWAN networks","volume":"8","author":"Marini","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2023.103283_b39","series-title":"2017 IEEE International Conference on Communications","first-page":"1","article-title":"Capacity limits of LoRaWAN technology for smart metering applications","author":"Varsier","year":"2017"},{"key":"10.1016\/j.adhoc.2023.103283_b40","doi-asserted-by":"crossref","first-page":"164102","DOI":"10.1109\/ACCESS.2019.2943720","article-title":"Performance evaluation of LoRaWAN for green Internet of Things","volume":"7","author":"Ali","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2023.103283_b41","series-title":"Digital cellular telecommunications system (phase 2+); radio network planning aspects (3GPP TR 03.30 version 8.4.0 release 1999)","author":"ETSI","year":"2005"},{"issue":"3","key":"10.1016\/j.adhoc.2023.103283_b42","first-page":"1","article-title":"Hata-okumura model computer analysis for path loss determination at 900MHz for Maiduguri, Nigeria","volume":"3","author":"Deme","year":"2013","journal-title":"Math. Theory Model."},{"key":"10.1016\/j.adhoc.2023.103283_b43","series-title":"IEEE Global Communications Conference","first-page":"3942","article-title":"Path loss validation for urban micro cell scenarios at 3.5 GHz compared to 1.9 GHz","author":"Rodriguez","year":"2013"},{"key":"10.1016\/j.adhoc.2023.103283_b44","series-title":"3rd International Symposium on Wireless Communication Systems","first-page":"63","article-title":"Characterisation of signal penetration into buildings for GSM and UMTS","author":"Ferreira","year":"2006"},{"key":"10.1016\/j.adhoc.2023.103283_b45","series-title":"Large-Scale Data Analytics and Its Relationship to Simulation","author":"Leland","year":"2016"},{"issue":"1","key":"10.1016\/j.adhoc.2023.103283_b46","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1137\/S0097539701398375","article-title":"The nonstochastic multiarmed bandit problem","volume":"32","author":"Auer","year":"2002","journal-title":"SIAM J. Comput."}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870523002032?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870523002032?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T13:07:09Z","timestamp":1696856829000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870523002032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":46,"alternative-id":["S1570870523002032"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2023.103283","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Massive multi-player multi-armed bandits for IoT networks: An application on LoRa networks","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2023.103283","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103283"}}