| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960 |
- \begin{thebibliography}{10}
- \bibitem{Liu24:INFOCOM}
- M.~Liu, Z.~Li, X.~Wang, and J.~C. Lui, ``{LinkSelFiE: Link Selection and
- Fidelity Estimation in Quantum Networks},'' in {\em Proceedings of the 43rd
- IEEE Conference on Computer Communications (INFOCOM 2024)}, pp.~1421--1430,
- May 2024.
- \bibitem{Knill2008_RB}
- E.~Knill, D.~Leibfried, R.~Reichle, J.~Britton, R.~B. Blakestad, J.~D. Jost,
- C.~Langer, R.~Ozeri, S.~Seidelin, and D.~J. Wineland, ``Randomized
- benchmarking of quantum gates,'' {\em Physical Review A}, vol.~77, no.~1,
- p.~012307, 2008.
- \bibitem{Helsen2017_MultiqubitRB}
- J.~Helsen, F.~Battistel, and B.~M. Terhal, ``Multiqubit randomized benchmarking
- using few samples,'' {\em Physical Review A}, vol.~100, no.~3, p.~032304,
- 2019.
- \bibitem{Epstein2014_LimitsRB}
- J.~M. Epstein, A.~W. Cross, E.~Magesan, and J.~M. Gambetta, ``Investigating the
- limits of randomized benchmarking protocols,'' {\em Physical Review A},
- vol.~89, no.~6, p.~062321, 2014.
- \bibitem{Helsen2023_NB}
- J.~Helsen and S.~Wehner, ``A benchmarking procedure for quantum networks,''
- {\em npj Quantum Information}, vol.~9, no.~1, p.~17, 2023.
- \bibitem{Liu2024_QBGP}
- M.~Liu, Z.~Li, K.~Cai, J.~Allcock, S.~Zhang, and J.~C. Lui, ``Quantum bgp with
- online path selection via network benchmarking,'' in {\em IEEE Conference on
- Computer Communications (INFOCOM)}, pp.~1401--1410, IEEE, 2024.
- \bibitem{Wang2025_LearningBestPaths}
- X.~Wang, M.~Liu, X.~Liu, Z.~Li, M.~Hajiesmaili, J.~C. Lui, and D.~Towsley,
- ``Learning best paths in quantum networks,'' in {\em IEEE Conference on
- Computer Communications (INFOCOM)}, IEEE, 2025.
- \bibitem{Bubeck2012_RegretAnalysis}
- S.~Bubeck and N.~Cesa-Bianchi, ``Regret analysis of stochastic and
- nonstochastic multi-armed bandit problems,'' {\em Foundations and Trends® in
- Machine Learning}, vol.~5, no.~1, pp.~1--122, 2012.
- \bibitem{Audibert10:COLT}
- J.-Y. Audibert and S.~Bubeck, ``{Best Arm Identification in Multi-Armed
- Bandits},'' in {\em Proceedings of the 23rd Annual Conference on Learning
- Theory (COLT)}, (Haifa, Israel), June 2010.
- \bibitem{Jamieson2014_BAI}
- K.~Jamieson and R.~Nowak, ``Best-arm identification algorithms for multi-armed
- bandits in the fixed confidence setting,'' in {\em 2014 48th Annual
- Conference on Information Sciences and Systems (CISS)}, pp.~1--6, IEEE, 2014.
- \bibitem{Coopmans2021_NetSquid}
- T.~Coopmans, R.~Knegjens, A.~Dahlberg, D.~Maier, L.~Nijsten, J.~Oliveira,
- M.~Papendrecht, J.~Rabbie, F.~Rozp{\k e}dek, M.~Skrzypczyk, {\em et~al.},
- ``Netsquid, a network simulator for quantum information using discrete
- events,'' {\em Communications Physics}, vol.~4, no.~1, p.~164, 2021.
- \end{thebibliography}
|