Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models
暂无分享,去创建一个
[1] Brian M. Sadler,et al. A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.
[2] Jonathan S. Adelstein. Statement of commissioner Jonathan S. Adelstein, Re: Unlicensed operation in the TV broadcast bands; second report and order and memorandum opinion and order, ET Docket no. 04-186 , 2010 .
[3] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[4] Bhaskar Krishnamachari,et al. Decentralized multi-armed bandit with imperfect observations , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] Lang Tong,et al. Low-complexity distributed spectrum sharing among multiple cognitive users , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[6] R. Agrawal. Sample mean based index policies by O(log n) regret for the multi-armed bandit problem , 1995, Advances in Applied Probability.
[7] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[8] Jianfeng Wang,et al. Emerging cognitive radio applications: A survey , 2011, IEEE Communications Magazine.
[9] H. Robbins. Some aspects of the sequential design of experiments , 1952 .
[10] T. L. Lai Andherbertrobbins. Asymptotically Efficient Adaptive Allocation Rules , 2022 .
[11] Qing Zhao,et al. Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.
[12] Rong Zheng,et al. Sequential learning for optimal monitoring of multi-channel wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[13] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[14] Rong Zheng,et al. On Quality of Monitoring for Multichannel Wireless Infrastructure Networks , 2010, IEEE Transactions on Mobile Computing.
[15] Lang Tong,et al. Multi-channel opportunistic spectrum access in unslotted primary systems with unknown models , 2011, 2011 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[16] Prasant Mohapatra,et al. Efficient data capturing for network forensics in cognitive radio networks , 2011, 2011 19th IEEE International Conference on Network Protocols.
[17] Moustafa Youssef,et al. A framework for wireless LAN monitoring and its applications , 2004, WiSe '04.
[18] H. Vincent Poor,et al. Cognitive Medium Access: Exploration, Exploitation, and Competition , 2007, IEEE Transactions on Mobile Computing.
[19] D. Morgan,et al. Cost and competition , 1986 .