\begin{thebibliography}{10} \bibitem{Liu24:INFOCOM} M.~Liu, Z.~Li, X.~Wang, and J.~C. Lui, ``{LinkSelFiE: Link Selection and Fidelity Estimation in Quantum Networks},'' in {\em Proceedings of the 43rd IEEE Conference on Computer Communications (INFOCOM 2024)}, pp.~1421--1430, May 2024. \bibitem{Knill2008_RB} E.~Knill, D.~Leibfried, R.~Reichle, J.~Britton, R.~B. Blakestad, J.~D. Jost, C.~Langer, R.~Ozeri, S.~Seidelin, and D.~J. Wineland, ``Randomized benchmarking of quantum gates,'' {\em Physical Review A}, vol.~77, no.~1, p.~012307, 2008. \bibitem{Helsen2017_MultiqubitRB} J.~Helsen, F.~Battistel, and B.~M. Terhal, ``Multiqubit randomized benchmarking using few samples,'' {\em Physical Review A}, vol.~100, no.~3, p.~032304, 2019. \bibitem{Epstein2014_LimitsRB} J.~M. Epstein, A.~W. Cross, E.~Magesan, and J.~M. Gambetta, ``Investigating the limits of randomized benchmarking protocols,'' {\em Physical Review A}, vol.~89, no.~6, p.~062321, 2014. \bibitem{Helsen2023_NB} J.~Helsen and S.~Wehner, ``A benchmarking procedure for quantum networks,'' {\em npj Quantum Information}, vol.~9, no.~1, p.~17, 2023. \bibitem{Liu2024_QBGP} M.~Liu, Z.~Li, K.~Cai, J.~Allcock, S.~Zhang, and J.~C. Lui, ``Quantum bgp with online path selection via network benchmarking,'' in {\em IEEE Conference on Computer Communications (INFOCOM)}, pp.~1401--1410, IEEE, 2024. \bibitem{Wang2025_LearningBestPaths} X.~Wang, M.~Liu, X.~Liu, Z.~Li, M.~Hajiesmaili, J.~C. Lui, and D.~Towsley, ``Learning best paths in quantum networks,'' in {\em IEEE Conference on Computer Communications (INFOCOM)}, IEEE, 2025. \bibitem{Bubeck2012_RegretAnalysis} S.~Bubeck and N.~Cesa-Bianchi, ``Regret analysis of stochastic and nonstochastic multi-armed bandit problems,'' {\em Foundations and TrendsĀ® in Machine Learning}, vol.~5, no.~1, pp.~1--122, 2012. \bibitem{Audibert10:COLT} J.-Y. Audibert and S.~Bubeck, ``{Best Arm Identification in Multi-Armed Bandits},'' in {\em Proceedings of the 23rd Annual Conference on Learning Theory (COLT)}, (Haifa, Israel), June 2010. \bibitem{Jamieson2014_BAI} K.~Jamieson and R.~Nowak, ``Best-arm identification algorithms for multi-armed bandits in the fixed confidence setting,'' in {\em 2014 48th Annual Conference on Information Sciences and Systems (CISS)}, pp.~1--6, IEEE, 2014. \bibitem{Coopmans2021_NetSquid} T.~Coopmans, R.~Knegjens, A.~Dahlberg, D.~Maier, L.~Nijsten, J.~Oliveira, M.~Papendrecht, J.~Rabbie, F.~Rozp{\k e}dek, M.~Skrzypczyk, {\em et~al.}, ``Netsquid, a network simulator for quantum information using discrete events,'' {\em Communications Physics}, vol.~4, no.~1, p.~164, 2021. \end{thebibliography}