{"id":"https://openalex.org/W4327778738","doi":"https://doi.org/10.1109/ccnc51644.2023.10059719","title":"Information Freshness-Oriented Relay Selection in Two-Way Relay Networks: A Multi-Armed Bandit Approach","display_name":"Information Freshness-Oriented Relay Selection in Two-Way Relay Networks: A Multi-Armed Bandit Approach","publication_year":2023,"publication_date":"2023-01-08","ids":{"openalex":"https://openalex.org/W4327778738","doi":"https://doi.org/10.1109/ccnc51644.2023.10059719"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51644.2023.10059719","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccnc51644.2023.10059719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100783376","display_name":"Guan\u2010Yu Chen","orcid":"https://orcid.org/0000-0002-2374-3742"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guanyu Chen","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China","College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047023625","display_name":"Tse-Tin Chan","orcid":"https://orcid.org/0000-0001-9235-7813"},"institutions":[{"id":"https://openalex.org/I4210086892","display_name":"Education University of Hong Kong","ror":"https://ror.org/000t0f062","country_code":"HK","type":"education","lineage":["https://openalex.org/I4210086892"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Tse-Tin Chan","raw_affiliation_strings":["The Education University of Hong Kong,Department of Mathematics and Information Technology,Hong Kong SAR,China","Department of Mathematics and Information Technology, The Education University of Hong Kong, Hong Kong SAR, China"],"affiliations":[{"raw_affiliation_string":"The Education University of Hong Kong,Department of Mathematics and Information Technology,Hong Kong SAR,China","institution_ids":["https://openalex.org/I4210086892"]},{"raw_affiliation_string":"Department of Mathematics and Information Technology, The Education University of Hong Kong, Hong Kong SAR, China","institution_ids":["https://openalex.org/I4210086892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076812737","display_name":"Haoyuan Pan","orcid":"https://orcid.org/0000-0003-3651-3417"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyuan Pan","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China","College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029636211","display_name":"Kin-Hon Ho","orcid":"https://orcid.org/0000-0002-2524-6950"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]},{"id":"https://openalex.org/I47605537","display_name":"The Hang Seng University of Hong Kong","ror":"https://ror.org/04fa64g55","country_code":"CN","type":"education","lineage":["https://openalex.org/I47605537"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Kin-Hon Ho","raw_affiliation_strings":["The Hang Seng University of Hong Kong,Department of Computing,Hong Kong SAR,China","Department of Computing, The Hang Seng University of Hong Kong, Hong Kong SAR, China"],"affiliations":[{"raw_affiliation_string":"The Hang Seng University of Hong Kong,Department of Computing,Hong Kong SAR,China","institution_ids":["https://openalex.org/I47605537","https://openalex.org/I889458895"]},{"raw_affiliation_string":"Department of Computing, The Hang Seng University of Hong Kong, Hong Kong SAR, China","institution_ids":["https://openalex.org/I47605537","https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100783376"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.4119,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58248817,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"702","last_page":"703"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13471","display_name":"Cognitive Functions and Memory","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.9538325071334839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7612418532371521},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.7074618935585022},{"id":"https://openalex.org/keywords/relay-channel","display_name":"Relay channel","score":0.6211414933204651},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.5995927453041077},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5318804383277893},{"id":"https://openalex.org/keywords/mutual-information","display_name":"Mutual information","score":0.5155324935913086},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4848126471042633},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4774939715862274},{"id":"https://openalex.org/keywords/multi-armed-bandit","display_name":"Multi-armed bandit","score":0.46771353483200073},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18880844116210938},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17144989967346191},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1664835512638092}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.9538325071334839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7612418532371521},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.7074618935585022},{"id":"https://openalex.org/C46257984","wikidata":"https://www.wikidata.org/wiki/Q7310895","display_name":"Relay channel","level":4,"score":0.6211414933204651},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.5995927453041077},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5318804383277893},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.5155324935913086},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4848126471042633},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4774939715862274},{"id":"https://openalex.org/C123197309","wikidata":"https://www.wikidata.org/wiki/Q2882343","display_name":"Multi-armed bandit","level":3,"score":0.46771353483200073},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18880844116210938},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17144989967346191},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1664835512638092},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C50817715","wikidata":"https://www.wikidata.org/wiki/Q79895177","display_name":"Regret","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51644.2023.10059719","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccnc51644.2023.10059719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2398048789","https://openalex.org/W3024336100","https://openalex.org/W3137257456","https://openalex.org/W3177724065","https://openalex.org/W3185165184","https://openalex.org/W3193025607"],"related_works":["https://openalex.org/W2327934204","https://openalex.org/W2758860619","https://openalex.org/W1596254492","https://openalex.org/W2162615821","https://openalex.org/W2781812141","https://openalex.org/W2389023995","https://openalex.org/W2974957471","https://openalex.org/W3145418082","https://openalex.org/W2041527525","https://openalex.org/W4327778738"],"abstract_inverted_index":{"We":[0],"study":[1],"the":[2,30,34,38,54,76,84,93,100,105,110,117,123],"relay":[3,10,55,66,125],"selection":[4,56,67,126],"problem":[5],"for":[6,57],"information":[7,26,41],"freshness-oriented":[8],"two-way":[9],"networks":[11],"(TWRNs)":[12],"operated":[13],"with":[14,92],"physical-layer":[15],"network":[16],"coding":[17],"(PNC).":[18],"Information":[19],"freshness":[20],"is":[21],"quantified":[22],"by":[23],"age":[24],"of":[25,37],"(AoI),":[27],"defined":[28],"as":[29,68,89,97],"time":[31,36],"elapsed":[32],"since":[33],"generation":[35],"latest":[39],"received":[40],"update.":[42],"Since":[43],"PNC":[44],"leads":[45],"to":[46,73],"mutual":[47],"wireless":[48],"interference":[49],"in":[50,99],"TWRNs,":[51],"this":[52,61,63],"complicates":[53],"users.":[58],"To":[59],"address":[60],"problem,":[62],"paper":[64],"formulates":[65],"a":[69],"multi-armed":[70],"bandit":[71],"(MAB)":[72],"dynamically":[74],"learn":[75],"optimal":[77],"mapping":[78],"between":[79],"users":[80,87],"and":[81,102],"relays.":[82],"Specifically,":[83],"two":[85],"end":[86],"act":[88],"agents,":[90],"interacting":[91],"environment,":[94],"receiving":[95],"feedback":[96],"rewards":[98],"MAB,":[101],"then":[103],"optimizing":[104],"system-level":[106],"AoI":[107],"performance":[108],"through":[109],"learning":[111],"experience.":[112],"Simulation":[113],"results":[114],"demonstrate":[115],"that":[116],"proposed":[118],"MAB":[119],"approach":[120],"significantly":[121],"outperforms":[122],"conventional":[124],"scheme.":[127]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
