Rested and Restless Bandits With Constrained Arms and Hidden States: Applications in Social Networks and 5G Networks | IEEE Journals & Magazine | IEEE Xplore