{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:14:44Z","timestamp":1728177284314},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office and Accomplished under Cooperative Agreement","doi-asserted-by":"publisher","award":["W911NF-19-2-0269"],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/twc.2022.3222781","type":"journal-article","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T19:11:09Z","timestamp":1669317069000},"page":"3997-4012","source":"Crossref","is-referenced-by-count":14,"title":["Link Scheduling Using Graph Neural Networks"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0346-8015","authenticated-orcid":false,"given":"Zhongyuan","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rice University, Houston, TX, USA"}]},{"given":"Gunjan","family":"Verma","sequence":"additional","affiliation":[{"name":"U.S. Army’s DEVCOM Army Research Laboratory, Adelphi, MD, USA"}]},{"given":"Chirag","family":"Rao","sequence":"additional","affiliation":[{"name":"U.S. Army’s DEVCOM Army Research Laboratory, Adelphi, MD, USA"}]},{"given":"Ananthram","family":"Swami","sequence":"additional","affiliation":[{"name":"U.S. Army’s DEVCOM Army Research Laboratory, Adelphi, MD, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8408-9633","authenticated-orcid":false,"given":"Santiago","family":"Segarra","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rice University, Houston, TX, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2017.8115823"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975499.12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.092711.102104"},{"key":"ref56","article-title":"Solving the maximum weight independent set problem: Application to indirect hex-mesh generation","author":"verhetsel","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010896"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-006-9635-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.355"},{"key":"ref58","author":"llc","year":"2020","journal-title":"Gurobi Optimizer Reference Manual"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36478-1_17"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.11.2.173"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3018955"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/11499305_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2749573"},{"key":"ref54","first-page":"17","volume":"9","author":"warren","year":"2006","journal-title":"Combinatorial branch-and-bound for the maximum weight independent set problem"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.33"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2225843"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2030448"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2417861"},{"key":"ref51","first-page":"1","article-title":"Differentiation of blackbox combinatorial solvers","author":"pogan?i?","year":"2019","journal-title":"Proc Int Conf Learn Repres (ICLR)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.3003837"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"ref45","first-page":"539","article-title":"Combinatorial optimization with graph convolutional networks and guided tree search","author":"li","year":"2018","journal-title":"Proc Adv Neural Info Process Syst"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref47","article-title":"Relational inductive biases, deep learning, and graph networks","author":"battaglia","year":"2018","journal-title":"arXiv 1806 01261"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9049000"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2887403"},{"key":"ref44","first-page":"6348","article-title":"Learning combinatorial optimization algorithms over graphs","author":"khalil","year":"2017","journal-title":"Proc Adv Neural Info Process Syst"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646544"},{"key":"ref49","author":"bertsekas","year":"2021","journal-title":"Rollout Policy Iteration and Distributed Reinforcement Learning"},{"key":"ref8","author":"sarkar","year":"2013","journal-title":"Ad Hoc Mobile Wireless Networks Principles Protocols and Applications"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1452","DOI":"10.1109\/JSAC.2006.879351","article-title":"A tutorial on cross-layer optimization in wireless networks","volume":"24","author":"lin","year":"2006","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2452272"},{"key":"ref4","article-title":"Optimal cross-layer design of wireless fading multi-hop networks","author":"marques","year":"2011","journal-title":"CRoss-LAYER DESIGNS in WLAN SYSTEMS"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TNET.2009.2026276","article-title":"Understanding the capacity region of the greedy maximal scheduling algorithm in multihop wireless networks","volume":"17","author":"joo","year":"2009","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2338277"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.239"},{"key":"ref40","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2017","journal-title":"Proc Int Conf Learn Repres (ICLR)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414805"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3071480"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761234"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746493"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933973"},{"key":"ref75","first-page":"387","article-title":"Deterministic policy gradient algorithms","author":"silver","year":"2014","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2809722"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2008.08.027"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800601"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.5486\/PMD.1959.6.3-4.12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/9.182479"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414098"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2988255"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904352"},{"key":"ref71","article-title":"Link scheduling using graph neural networks","author":"zhao","year":"2021","journal-title":"arXiv 2109 05536"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2016.2632040"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11322-2_6"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.134"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873606"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2020.580607"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062068"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014731"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/612018"},{"key":"ref25","article-title":"Delay-oriented analysis and design of optimal scheduling algorithms","author":"xue","year":"2013"},{"key":"ref69","first-page":"1","article-title":"What’s wrong with deep learning in tree search for combinatorial optimization","author":"b\u00f6ther","year":"2022","journal-title":"Proc Int Conf Learn Repres (ICLR)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9790629"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/WTS48268.2020.9198730"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101669"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/418934"},{"key":"ref66","first-page":"1","article-title":"Learning a SAT solver from single-bit supervision","author":"selsam","year":"2019","journal-title":"Proc Int Conf Learn Repres (ICLR)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2018.8450715"},{"key":"ref65","article-title":"Learning heuristics over large graphs via deep reinforcement learning","author":"manchanda","year":"2019","journal-title":"arXiv 1903 03332"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2014.00005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1239\/aap\/1151337082"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2825444"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.disopt.2008.12.001"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2012.10.106"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-012-1124-3"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/10147751\/09962800.pdf?arnumber=9962800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:56:34Z","timestamp":1687805794000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9962800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":77,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/twc.2022.3222781","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}