{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T05:25:02Z","timestamp":1745299502748,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/gcwkshps56602.2022.10008671","type":"proceedings-article","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T16:38:14Z","timestamp":1673541494000},"page":"383-388","source":"Crossref","is-referenced-by-count":7,"title":["Distributed Resource Allocation for URLLC in IIoT Scenarios: A Multi-Armed Bandit Approach"],"prefix":"10.1109","author":[{"given":"Francesco","family":"Pase","sequence":"first","affiliation":[{"name":"WiLab and University of Padova,Italy"}]},{"given":"Marco","family":"Giordani","sequence":"additional","affiliation":[{"name":"WiLab and University of Padova,Italy"}]},{"given":"Giampaolo","family":"Cuozzo","sequence":"additional","affiliation":[{"name":"WiLab and University of Bologna,Italy"}]},{"given":"Sara","family":"Cavallero","sequence":"additional","affiliation":[{"name":"WiLab and University of Bologna,Italy"}]},{"given":"Joseph","family":"Eichinger","sequence":"additional","affiliation":[{"name":"Huawei Technologies,Munich Research Center,Germany"}]},{"given":"Roberto","family":"Verdone","sequence":"additional","affiliation":[{"name":"WiLab and University of Bologna,Italy"}]},{"given":"Michele","family":"Zorzi","sequence":"additional","affiliation":[{"name":"WiLab and University of Padova,Italy"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/2200000068"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2964534"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894305"},{"journal-title":"ZVEI","article-title":"5G for Industrial Internet of Things (IIoT): Capabilities, Features, and Potential","year":"2021","key":"ref11"},{"key":"ref10","article-title":"On the Convergence Time of Federated Learning Over Wireless Networks Under Imperfect CSI","author":"pase","year":"2020","journal-title":"IEEE International Conference on Communications Workshops (ICC)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900411"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933962"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2890686"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3018822"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2014.0650"},{"key":"ref24","first-page":"901","article-title":"Study on channel model for frequencies from 0.5 to 100 GHz (Release 16)","volume":"38","year":"2019","journal-title":"Technical Specification (TS)"},{"key":"ref23","article-title":"3GPP NR: the cellular standard for 5G networks","author":"polese","year":"2019","journal-title":"5G-ITALY White Book"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2962338"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76207-4_15"},{"key":"ref21","article-title":"Differentiable Meta-Learning of Bandit Policies","author":"boutilier","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100237"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s19163575"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700200"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit54941.2022.9815750"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2649104"},{"key":"ref6","first-page":"321","article-title":"NR; Medium Access Control (MAC) protocol specification – Release 15","volume":"38","year":"2019","journal-title":"3GPP Technical Specification (TS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.2000054"}],"event":{"name":"2022 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2022,12,4]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2022,12,8]]}},"container-title":["2022 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10008390\/10008474\/10008671.pdf?arnumber=10008671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T14:22:39Z","timestamp":1675779759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10008671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps56602.2022.10008671","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}