Imitative Spectrum Access Mechanism

In this chapter, we will design distributed spectrum access mechanism based on imitation, which is also a common phenomenon in many social animal and human interactions [1].

[1]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[2]  T. Ferguson A Course in Large Sample Theory , 1996 .

[3]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[4]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[5]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[6]  Marceau Coupechoux,et al.  Let Cognitive Radios Imitate: Imitation-based Spectrum Access for Cognitive Radio Networks , 2011, ArXiv.

[7]  Guanhua Yan,et al.  Fine-grained private matching for proximity-based mobile social networking , 2012, 2012 Proceedings IEEE INFOCOM.

[8]  R. Ho,et al.  Proximity communication , 2004, IEEE Journal of Solid-State Circuits.

[9]  Brandon F. Lo A survey of common control channel design in cognitive radio networks , 2011, Phys. Commun..

[10]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[11]  Ao Tang,et al.  Opportunistic Spectrum Access with Multiple Users: Learning under Competition , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Sisi Liu,et al.  Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[13]  Roger Wattenhofer,et al.  VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[14]  Marceau Coupechoux,et al.  Imitation-based spectrum access policy for CSMA/CA-based cognitive radio networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[16]  L.A. DaSilva,et al.  Sequence-Based Rendezvous for Dynamic Spectrum Access , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[17]  Manuel Lopes,et al.  Affordance-based imitation learning in robots , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[18]  Miguel López-Benítez,et al.  Empirical Time-Dimension Model of Spectrum Use Based on a Discrete-Time Markov Chain With Deterministic and Stochastic Duty Cycle Models , 2011, IEEE Transactions on Vehicular Technology.

[19]  Santosh Pandey,et al.  IEEE 802.11af: a standard for TV white space spectrum sharing , 2013, IEEE Communications Magazine.

[20]  M. Benaïm,et al.  Deterministic Approximation of Stochastic Evolution in Games , 2003 .

[21]  John Scott What is social network analysis , 2010 .

[22]  Carlos Alós-Ferrer,et al.  Contagion and efficiency , 2008, J. Econ. Theory.

[23]  Kaigui Bian,et al.  Control Channel Establishment in Cognitive Radio Networks using Channel Hopping , 2011, IEEE Journal on Selected Areas in Communications.

[24]  Xu Chen,et al.  Imitation-Based Social Spectrum Sharing , 2014, IEEE Transactions on Mobile Computing.

[25]  W. Wyrwicka,et al.  Imitation in human and animal behavior , 1995 .

[26]  Husheng Li,et al.  Multi-Agent Q-Learning for Competitive Spectrum Access in Cognitive Radio Systems , 2010, 2010 Fifth IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR).

[27]  K. Schlag Why Imitate, and If So, How?, : A Boundedly Rational Approach to Multi-armed Bandits , 1998 .