{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T21:41:58Z","timestamp":1772833318820,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tnsm.2020.3037486","type":"journal-article","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T21:06:15Z","timestamp":1605128775000},"page":"1832-1849","source":"Crossref","is-referenced-by-count":15,"title":["Adaptive and Reinforcement Learning Approaches for Online Network Monitoring and Analysis"],"prefix":"10.1109","volume":"18","author":[{"given":"Sarah","family":"Wassermann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-4233-2316","authenticated-orcid":false,"given":"Thibaut","family":"Cuvelier","sequence":"additional","affiliation":[]},{"given":"Pavol","family":"Mulinka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-0951-2331","authenticated-orcid":false,"given":"Pedro","family":"Casas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"santoro","year":"2016","journal-title":"One-shot learning with memory-augmented neural networks"},{"key":"ref38","author":"song","year":"2017","journal-title":"A contextual bandit approach for stream-based active learning"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00607"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.09.032"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40897-7_6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICACI.2016.7449823"},{"key":"ref37","author":"song","year":"2016","journal-title":"Stream-based online active learning in a contextual multi-armed bandit framework"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref35","first-page":"2659","article-title":"Active learning by learning","author":"hsu","year":"2015","journal-title":"Proc 29th AAAI Conf Artif Intell"},{"key":"ref34","first-page":"255","article-title":"Online choice of active learning algorithms","volume":"5","author":"baram","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref28","first-page":"597","article-title":"Active learning with evolving streaming data","author":"\u017eliobait?","year":"2011","journal-title":"Machine Learning and Knowledge Discovery in Databases"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116900"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2012.2236570"},{"key":"ref2","article-title":"Active learning literature survey","author":"settles","year":"2010"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.07.031"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.42"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03915-7_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05224-8_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28645-5_29"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480516"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0040"},{"key":"ref25","first-page":"77","article-title":"Early drift detection method","author":"baena-garc","year":"2006","journal-title":"Proc 4th Int Workshop Knowl Discovery Data Streams"},{"key":"ref50","article-title":"Learning from delayed rewards","author":"watkins","year":"1989"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"ref56","first-page":"1","article-title":"Scikit-multiflow: A multi-output streaming framework","volume":"19","author":"montiel","year":"2018","journal-title":"J Mach Learn Res"},{"key":"ref55","first-page":"1601","article-title":"Moa: Massive online analysis","volume":"11","author":"bifet","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1022-8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783372"},{"key":"ref52","first-page":"2551","article-title":"VC theory of large margin multi-category classifiers","volume":"8","author":"guermeur","year":"2007","journal-title":"J Mach Learn Res"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8255998"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0114-6"},{"key":"ref40","first-page":"301","article-title":"Learning algorithms for active learning","author":"bachman","year":"2017","journal-title":"Proc 34th Int Conf Mach Learn ICML"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347107"},{"key":"ref13","first-page":"1","article-title":"Catching up with the data: Research issues in mining data streams","author":"domingos","year":"2001","journal-title":"Proc Workshop Res Issues Data Min Knowl Discovery DMKD"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1107499.1107504"},{"key":"ref15","author":"hulten","year":"2005","journal-title":"Mining massive data streams"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557060"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-012-5320-9"},{"key":"ref18","author":"bouneffouf","year":"2020","journal-title":"Online learning with Corrupted context Corrupted contextual bandits"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-011-0008-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012675"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNMT.2009.5374676"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/41.1-2.100"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098593.3098594"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103589"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0217408"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-017-5642-8"},{"key":"ref42","author":"pang","year":"2018","journal-title":"Meta-learning transferable active learning policies by deep reinforcement learning"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1063"},{"key":"ref44","author":"woodward","year":"2017","journal-title":"Active one-shot learning"},{"key":"ref43","author":"konyushkova","year":"2017","journal-title":"Learning active learning from real and synthetic data"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/4275028\/9450206\/09256319.pdf?arnumber=9256319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:40Z","timestamp":1652194360000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9256319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":56,"journal-issue":{"issue":"2"},"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/tnsm.2020.3037486","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}