{"id":"https://openalex.org/W2227775890","doi":"https://doi.org/10.1186/s13638-015-0515-y","title":"Resource-aware task scheduling by an adversarial bandit solver method in wireless sensor networks","display_name":"Resource-aware task scheduling by an adversarial bandit solver method in wireless sensor networks","publication_year":2016,"publication_date":"2016-01-08","ids":{"openalex":"https://openalex.org/W2227775890","doi":"https://doi.org/10.1186/s13638-015-0515-y","mag":"2227775890"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-015-0515-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-015-0515-y","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-015-0515-y","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-015-0515-y","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074746901","display_name":"Muhidul Islam Khan","orcid":"https://orcid.org/0000-0002-9035-9046"},"institutions":[{"id":"https://openalex.org/I5518804","display_name":"BRAC University","ror":"https://ror.org/00sge8677","country_code":"BD","type":"education","lineage":["https://openalex.org/I5518804"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Muhidul Islam Khan","raw_affiliation_strings":["BRAC University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"BRAC University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I5518804"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5074746901"],"corresponding_institution_ids":["https://openalex.org/I5518804"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":2.1543,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.88113952,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2016","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8986850380897522},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8720307350158691},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7670317888259888},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.6423211693763733},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6164734363555908},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5920222401618958},{"id":"https://openalex.org/keywords/solver","display_name":"Solver","score":0.5056948661804199},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4823817312717438},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4638286828994751},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4601057767868042},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35826754570007324},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2627836763858795},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.16798368096351624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06742799282073975}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8986850380897522},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8720307350158691},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7670317888259888},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6423211693763733},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6164734363555908},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5920222401618958},{"id":"https://openalex.org/C2778770139","wikidata":"https://www.wikidata.org/wiki/Q1966904","display_name":"Solver","level":2,"score":0.5056948661804199},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4823817312717438},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4638286828994751},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4601057767868042},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35826754570007324},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2627836763858795},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.16798368096351624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06742799282073975},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13638-015-0515-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-015-0515-y","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-015-0515-y","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:localhost:10361/6642","is_oa":false,"landing_page_url":"http://hdl.handle.net/10361/6642","pdf_url":null,"source":{"id":"https://openalex.org/S4306402122","display_name":"BRAC University Institutional Repository (BRAC University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5518804","host_organization_name":"BRAC University","host_organization_lineage":["https://openalex.org/I5518804"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1186/s13638-015-0515-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-015-0515-y","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-015-0515-y","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2227775890.pdf","grobid_xml":"https://content.openalex.org/works/W2227775890.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W119447173","https://openalex.org/W1598442493","https://openalex.org/W1974740629","https://openalex.org/W1986186099","https://openalex.org/W1993478093","https://openalex.org/W1998307152","https://openalex.org/W1998310770","https://openalex.org/W2015244507","https://openalex.org/W2015729136","https://openalex.org/W2049276813","https://openalex.org/W2075468109","https://openalex.org/W2077902449","https://openalex.org/W2083632634","https://openalex.org/W2098781871","https://openalex.org/W2102777365","https://openalex.org/W2108327942","https://openalex.org/W2113059852","https://openalex.org/W2119942913","https://openalex.org/W2121863487","https://openalex.org/W2124640918","https://openalex.org/W2128542122","https://openalex.org/W2131061517","https://openalex.org/W2135505702","https://openalex.org/W2166570570","https://openalex.org/W2168125208","https://openalex.org/W2168277846","https://openalex.org/W2170447857","https://openalex.org/W2172274178","https://openalex.org/W2497014164","https://openalex.org/W2797532987","https://openalex.org/W2947224705","https://openalex.org/W4214717370","https://openalex.org/W4240118496"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"A":[0],"wireless":[1],"sensor":[2,13],"network":[3],"(WSN)":[4],"is":[5,27,40,76],"composed":[6],"of":[7,11,70,103,120,142],"a":[8,28,34,48,110],"large":[9],"number":[10],"tiny":[12],"nodes.":[14],"Sensor":[15],"nodes":[16,21],"are":[17,22,123],"very":[18],"resource-constrained,":[19],"since":[20],"often":[23],"battery-operated":[24],"and":[25,63,78,96,117,138],"energy":[26],"scarce":[29],"resource.":[30],"In":[31],"this":[32],"paper,":[33],"resource-aware":[35],"task":[36],"scheduling":[37,83],"(RATS)":[38],"method":[39,57,75],"proposed":[41,73,131],"with":[42,80],"better":[43],"performance/resource":[44],"consumption":[45,107],"trade-off":[46,108],"in":[47,101,109,140],"WSN.":[49,71],"Particularly,":[50],"RATS":[51,74,132],"exploits":[52],"an":[53],"adversarial":[54],"bandit":[55],"solver":[56],"called":[58],"exponential":[59],"weight":[60],"for":[61,66],"exploration":[62],"exploitation":[64],"(Exp3)":[65],"target":[67,111],"tracking":[68,105,112,144],"application":[69],"The":[72,114],"compared":[77],"evaluated":[79],"the":[81,104,130,134],"existing":[82,135],"methods":[84,122,136],"exploiting":[85],"online":[86],"learning:":[87],"distributed":[88],"independent":[89],"reinforcement":[90,93,98],"learning":[91,94,99],"(DIRL),":[92],"(RL),":[95],"cooperative":[97],"(CRL),":[100],"terms":[102,141],"quality/energy":[106],"application.":[113],"communication":[115],"overhead":[116],"computational":[118],"effort":[119],"these":[121],"also":[124],"computed.":[125],"Simulation":[126],"results":[127],"show":[128],"that":[129],"outperforms":[133],"DIRL":[137],"RL":[139],"achieved":[143],"performance.":[145]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
