{"id":"https://openalex.org/W1932924964","doi":"https://doi.org/10.1109/icc.2015.7248548","title":"Online channel selection and user association in high-density WiFi networks","display_name":"Online channel selection and user association in high-density WiFi networks","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1932924964","doi":"https://doi.org/10.1109/icc.2015.7248548","mag":"1932924964"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2015.7248548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2015.7248548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024654256","display_name":"Lingzhi Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingzhi Wang","raw_affiliation_strings":["Sch. of Inf. Security Eng., Shanghai Jiao Tong University, Shanghai, CN","School of Information Security Engineering, Shanghai Jiao Tong University, 200240 China"],"affiliations":[{"raw_affiliation_string":"Sch. of Inf. Security Eng., Shanghai Jiao Tong University, Shanghai, CN","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, 200240 China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044004251","display_name":"Cunqing Hua","orcid":"https://orcid.org/0000-0003-0243-805X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cunqing Hua","raw_affiliation_strings":["Sch. of Inf. Security Eng., Shanghai Jiao Tong University, Shanghai, CN","School of Information Security Engineering, Shanghai Jiao Tong University, 200240 China"],"affiliations":[{"raw_affiliation_string":"Sch. of Inf. Security Eng., Shanghai Jiao Tong University, Shanghai, CN","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, 200240 China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056442083","display_name":"Rong Zheng","orcid":"https://orcid.org/0000-0003-4070-075X"},"institutions":[{"id":"https://openalex.org/I98251732","display_name":"McMaster University","ror":"https://ror.org/02fa3aq29","country_code":"CA","type":"education","lineage":["https://openalex.org/I98251732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rong Zheng","raw_affiliation_strings":["Dept. of Computing and Software, McMaster University Michael G DeGroote School of Medicine, Hamilton, ON, CA","[Department of Computing and Software, McMaster University, Canada]"],"affiliations":[{"raw_affiliation_string":"Dept. of Computing and Software, McMaster University Michael G DeGroote School of Medicine, Hamilton, ON, CA","institution_ids":["https://openalex.org/I98251732"]},{"raw_affiliation_string":"[Department of Computing and Software, McMaster University, Canada]","institution_ids":["https://openalex.org/I98251732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045776608","display_name":"Rui Ni","orcid":"https://orcid.org/0000-0002-4382-7580"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ni Rui","raw_affiliation_strings":["Huawei Technologies Co Ltd, Shenzhen, Guangdong, CN","Huawei Technologies Co. Ltd., Shenzhen 518129, China"],"affiliations":[{"raw_affiliation_string":"Huawei Technologies Co Ltd, Shenzhen, Guangdong, CN","institution_ids":["https://openalex.org/I2250955327"]},{"raw_affiliation_string":"Huawei Technologies Co. Ltd., Shenzhen 518129, China","institution_ids":["https://openalex.org/I2250955327"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024654256"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":1.6024,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.84980896,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"56","issue":null,"first_page":"1571","last_page":"1576"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7375035285949707},{"id":"https://openalex.org/keywords/selfishness","display_name":"Selfishness","score":0.71393883228302},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6872588992118835},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.6243094205856323},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6222367286682129},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5543416142463684},{"id":"https://openalex.org/keywords/channel-allocation-schemes","display_name":"Channel allocation schemes","score":0.5031663775444031},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4969489872455597},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.45411136746406555},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4506455063819885},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4325443506240845},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3382965624332428},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16075807809829712},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1438678801059723},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12538117170333862}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7375035285949707},{"id":"https://openalex.org/C2778841147","wikidata":"https://www.wikidata.org/wiki/Q36381317","display_name":"Selfishness","level":2,"score":0.71393883228302},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6872588992118835},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6243094205856323},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6222367286682129},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5543416142463684},{"id":"https://openalex.org/C114237682","wikidata":"https://www.wikidata.org/wiki/Q5072483","display_name":"Channel allocation schemes","level":3,"score":0.5031663775444031},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4969489872455597},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.45411136746406555},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4506455063819885},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4325443506240845},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3382965624332428},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16075807809829712},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1438678801059723},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12538117170333862},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2015.7248548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2015.7248548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1529039634","https://openalex.org/W1570963478","https://openalex.org/W1980776940","https://openalex.org/W1983217783","https://openalex.org/W2039650468","https://openalex.org/W2127904107","https://openalex.org/W2133492106","https://openalex.org/W2144585620","https://openalex.org/W2145931791","https://openalex.org/W2150461103","https://openalex.org/W2158452137","https://openalex.org/W6645434650"],"related_works":["https://openalex.org/W2039301641","https://openalex.org/W4376854896","https://openalex.org/W2583941345","https://openalex.org/W2375025128","https://openalex.org/W839810482","https://openalex.org/W1581165554","https://openalex.org/W3208171178","https://openalex.org/W3011329127","https://openalex.org/W2519139425","https://openalex.org/W4224228872"],"abstract_inverted_index":{"In":[0],"this":[1,48,102],"paper,":[2],"we":[3,50],"consider":[4],"the":[5,62,72,79,121,124],"emerging":[6],"deployment":[7],"of":[8,74,81,112,123],"WiFi":[9],"networks":[10],"in":[11],"sports":[12],"and":[13,21,33,55,85,127],"entertainment":[14],"venues":[15],"characterized":[16],"by":[17],"high-density,":[18],"large":[19],"capacity,":[20],"real-time":[22],"service":[23],"delivery.":[24],"Due":[25],"to":[26,96,107,109],"extremely":[27],"high":[28],"user":[29,34,56],"density,":[30],"channel":[31,53,75],"allocation":[32],"association":[35,57],"should":[36],"be":[37,45],"carefully":[38],"managed":[39],"so":[40],"that":[41],"cochannel":[42],"inference":[43],"can":[44],"mitigated.":[46],"To":[47],"end,":[49],"propose":[51],"a":[52,110],"selection":[54],"(CSUA)":[58],"solution":[59],"based":[60],"on":[61],"Adversarial":[63],"Multi-armed":[64],"Bandit":[65],"(AMAB)":[66],"framework,":[67],"which":[68,104],"captures":[69],"not":[70],"only":[71],"uncertainty":[73],"states,":[76],"but":[77],"also":[78],"selfishness":[80],"individual":[82],"stations":[83],"(STAs)":[84],"access":[86],"points":[87],"(APs).":[88],"An":[89],"exponentially":[90],"weighted":[91],"average":[92],"strategy":[93],"is":[94,105],"adopted":[95],"design":[97],"an":[98],"online":[99],"algorithm":[100,126],"for":[101],"problem,":[103],"guaranteed":[106],"converge":[108],"set":[111],"correlated":[113],"equilibria":[114],"with":[115],"vanishing":[116],"regrets.":[117],"Simulation":[118],"results":[119],"show":[120],"convergence":[122],"proposed":[125],"its":[128],"performance":[129],"under":[130],"different":[131],"settings.":[132]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
