{"id":"https://openalex.org/W7124142925","doi":"https://doi.org/10.48550/arxiv.2601.08760","title":"Adaptive Requesting in Decentralized Edge Networks via Non-Stationary Bandits","display_name":"Adaptive Requesting in Decentralized Edge Networks via Non-Stationary Bandits","publication_year":2026,"publication_date":"2026-01-13","ids":{"openalex":"https://openalex.org/W7124142925","doi":"https://doi.org/10.48550/arxiv.2601.08760"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.08760","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.08760","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.08760","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zhuang, Yi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhuang, Yi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122993768","display_name":"Kun Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Kun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123020699","display_name":"Xingran Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Xingran","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.004699999932199717,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5318999886512756},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.5160999894142151},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4855000078678131},{"id":"https://openalex.org/keywords/reset","display_name":"Reset (finance)","score":0.4659000039100647},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4172999858856201},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.3896999955177307},{"id":"https://openalex.org/keywords/observable","display_name":"Observable","score":0.3707999885082245}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7404999732971191},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5318999886512756},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.5160999894142151},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4855000078678131},{"id":"https://openalex.org/C2779795794","wikidata":"https://www.wikidata.org/wiki/Q7315343","display_name":"Reset (finance)","level":2,"score":0.4659000039100647},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4586000144481659},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4172999858856201},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3896999955177307},{"id":"https://openalex.org/C32848918","wikidata":"https://www.wikidata.org/wiki/Q845789","display_name":"Observable","level":2,"score":0.3707999885082245},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3686000108718872},{"id":"https://openalex.org/C2780713532","wikidata":"https://www.wikidata.org/wiki/Q93158","display_name":"Edge of chaos","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3312000036239624},{"id":"https://openalex.org/C2985963534","wikidata":"https://www.wikidata.org/wiki/Q7603704","display_name":"State information","level":3,"score":0.30169999599456787},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2883000075817108},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28049999475479126},{"id":"https://openalex.org/C2775973920","wikidata":"https://www.wikidata.org/wiki/Q3252726","display_name":"Selection algorithm","level":3,"score":0.2694000005722046},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2612999975681305},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.259799987077713},{"id":"https://openalex.org/C17098449","wikidata":"https://www.wikidata.org/wiki/Q176814","display_name":"Partially observable Markov decision process","level":4,"score":0.2524999976158142},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.08760","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.08760","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.08760","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.08760","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.4022088646888733,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"We":[0,47,131],"study":[1],"a":[2,59,70],"decentralized":[3,76],"collaborative":[4],"requesting":[5],"problem":[6,68],"that":[7,137],"aims":[8],"to":[9,126],"optimize":[10],"the":[11,42,49,52,67,81,112,138,147],"information":[12,55],"freshness":[13],"of":[14,21,44,54,62],"time-sensitive":[15],"clients":[16],"in":[17,98],"edge":[18],"networks":[19],"consisting":[20],"multiple":[22],"clients,":[23,90],"access":[24],"nodes":[25],"(ANs),":[26],"and":[27,65,77,87,91,95,144],"servers.":[28],"Clients":[29],"request":[30],"content":[31],"through":[32,150],"ANs":[33],"acting":[34],"as":[35,51,69],"gateways,":[36],"without":[37],"observing":[38],"AN":[39],"states":[40],"or":[41],"actions":[43],"other":[45],"clients.":[46],"define":[48],"reward":[50,83,129],"age":[53],"reduction":[56],"resulting":[57,82],"from":[58],"client's":[60],"selection":[61],"an":[63],"AN,":[64],"formulate":[66],"non-stationary":[71],"multi-armed":[72],"bandit.":[73],"In":[74],"this":[75],"partially":[78],"observable":[79],"setting,":[80],"process":[84],"is":[85],"history-dependent":[86],"coupled":[88],"across":[89],"exhibits":[92],"both":[93],"abrupt":[94],"gradual":[96],"changes":[97],"expected":[99],"rewards,":[100],"rendering":[101],"classical":[102],"bandit-based":[103],"approaches":[104],"ineffective.":[105],"To":[106],"address":[107],"these":[108],"challenges,":[109],"we":[110,145],"propose":[111],"AGING":[113],"BANDIT":[114],"WITH":[115],"ADAPTIVE":[116],"RESET":[117],"algorithm,":[118],"which":[119],"combines":[120],"adaptive":[121],"windowing":[122],"with":[123],"periodic":[124],"monitoring":[125],"track":[127],"evolving":[128],"distributions.":[130],"establish":[132],"theoretical":[133,148],"performance":[134],"guarantees":[135],"showing":[136],"proposed":[139],"algorithm":[140],"achieves":[141],"near-optimal":[142],"performance,":[143],"validate":[146],"results":[149],"simulations.":[151]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-15T00:00:00"}
