Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-ndw9j Total loading time: 0 Render date: 2024-11-08T04:51:39.689Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  05 December 2012

Ezio Biglieri
Affiliation:
Universitat Pompeu Fabra, Barcelona
Andrea J. Goldsmith
Affiliation:
Stanford University, California
Larry J. Greenstein
Affiliation:
Rutgers University, New Jersey
Narayan B. Mandayam
Affiliation:
Rutgers University, New Jersey
H. Vincent Poor
Affiliation:
Princeton University, New Jersey
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

M., Abramowitz and I. A., Stegun (eds.), Handbook of Mathematical Functions, Dover Publ. Inc., 1972.
J., Acharya, H., Viswanathan, and S., Venkatesan, “Timing acquisition for noncontiguous OFDM based dynamic spectrum access,” IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2008, Oct. 2008, pp. 1–10.Google Scholar
J., Acharya and R., Yates, “Dynamic spectrum allocation for uplink users with heterogeneous utilities,” IEEE Trans. Wireless Commun., 8, no. 3, 1405–1413, Mar. 2009.Google Scholar
P., Agrawal and N., Patwari, “Correlated link shadow fading in multi-hop wireless networks,” IEEE Trans. Wireless Commun., 8, no. 8, 4024–4036, Aug. 2009.Google Scholar
R., Agrawal, M. V., Hedge, and D., Teneketzis, “Asymptotically efficient adaptive allocation rules for the multiarmed bandit problem with switching cost,” IEEE Trans. Autom. Control, 33, no. 10, 899–906, Oct. 1988.Google Scholar
R., Agrawal, M. V., Hedge, and D., Teneketzis, “Multi-armed bandit problems with multiple plays and switching cost,” Stochast. Stochast. Rep., 29, 437–459, 1990.Google Scholar
S., Ahmad and M., Liu, “Multi-channel opportunistic access: a case of restless bandits with multiple plays,” Proc. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Oct. 2009, pp. 1361–1368.Google Scholar
S. H., Ahmad, M., Liu, T., Javidi, Q., Zhao, and B., Krishnamachari, “Optimality of myopic sensing in multi-channel opportunistic access,” IEEE Trans. Inf. Theory, 55, no. 9, 4040–4050, Sep. 2009.Google Scholar
A., Algans, K. I., Pedersen, and P. E., Mogensen, “Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading,” IEEE J. Sel. Areas Commun., 20, no. 3, 523–531, Apr. 2002.Google Scholar
K., Amiri, Y., Sun, P., Murphy, C., Hunter, J. R., Cavallaro, and A., Sabharwal, “WARP, a modular testbed for configurable wireless network research at Rice,” Proc. IEEE SWRIF, 2007.Google Scholar
K., Amiri, Y., Sun, P., Murphy, C., Hunter, J., Cavallaro, and A., Sabharwal, “WARP, a unified wireless network testbed for education and research,” in IEEE International Conference on Microelectronic Systems Education, June 2007, pp. 53–54.Google Scholar
A., Anandkumar, N., Michael, and A. K., Tang, “Opportunistic spectrum access with multiple users: learning under competition,” Proc. IEEE Conf. Computer Communications (INFOCOM 2010), San Diego, CA, USA, Mar. 15–19, 2010.Google Scholar
A., Anandkumar, N., Michael, A. K., Tang, and A., Swami, “Distributed algorithms for learning and cognitive medium access with logarithmic regret,” IEEE J. Sel. Areas in Commun., 29, no. 4, 731–745, Apr. 2011.Google Scholar
V., Anantharam, P., Varaiya, and J., Walrand, “Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple plays – part I: i.i.d. rewards,” IEEE Trans. Autom. Control, AC–32, no. 11, 968–977, Nov. 1987.Google Scholar
V., Anantharam, P., Varaiya, and J., Walrand, “Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple plays – part II: Markovian rewards,” IEEE Trans. Autom. Control, AC–32, no. 11, 977–982, Nov. 1987.Google Scholar
J., Andrews, A., Ghosh, and R., Muhamed, Fundamentals of WiMAX, Prentice-Hall, 2007.Google Scholar
V. S., Annapureddy and V., Veeravalli, “Gaussian interference networks: sum capacity in the low interference regime and new outer bounds on the capacity region,” IEEE Trans. Inf. Theory, 55, no. 7, 3032–3050, July 2009.Google Scholar
Annex 12 to working party 5A chairman's report,” Radiocommunication Study Groups, ITU, Tech. Rep., 2010.
M. R., Aref, Information Flow in Relay Networks, Ph.D Dissertation, Stanford University, Stanford, CA, 1980.Google Scholar
E., Arıkan, “Some complexity results about packet radio networks,” IEEE Trans. Inf. Theory, 30, no. 4, 681–685, July 1984.Google Scholar
A. A., Arowojolu, A. M. D., Turkmani, and J. D., Parsons, “Time dispersion measurements in urban microcellular environments,” Proc. IEEE Veh. Technol. Conf., pp. 150–154, 1994.Google Scholar
M., Asawa and D., Teneketzis, “Multi-armed bandits with switching penalties,” IEEE Trans. Autom. Control, 41, no. 3, 328–348, Mar. 1996.Google Scholar
H., Asplund, A. A., Glazunov, A. F., Molisch, K. I., Pedersen, and M., Steinbauer, “The COST259 directional channel model – Part II: Macrocells,” IEEE Trans. Wireless Commun., 5, no. 12, 3434–3450, Dec. 2006.Google Scholar
J.-Y., Audibert, R., Munos, and C., Szepesvári, “Exploration–exploitation tradeoff using variance estimates in multi-armed bandits,” Theor. Comput. Sci., 410, no. 19, 1876–1902, Apr. 2009.Google Scholar
P., Auer, N., Cesa-Bianchi, and P., Fischer, “Finite-time analysis of the multiarmed bandit problem,” Mach. Learn., 47, no. 2–3, 235–256, 2002.Google Scholar
P., Auer and R., Ortner, “UCB revisited: improved regret bounds for the stochastic multi-armed bandit problems,” Period. Math. Hungar., 61, no. 1–2, 55–65, 2010.Google Scholar
E., Axell and E. G., Larsson, “Optimal and sub-optimal spectrum sensing of OFDM signals in known and unknown noise variance,” IEEE J. Sel. Areas Commun., 29, no. 2, 290–304, Feb. 2011.Google Scholar
C., Bae and W. E., Stark, “End-to-end energy/bandwidth tradeoff in multihop wireless networks,” IEEE Trans. Inf. Theory, 55, no. 9, 4051–4066, Sep. 2009.Google Scholar
P., Bahl, R., Chandra, T., Moscibroda, R., Murty, and M., Welsh, “White space networking with WiFi like connectivity,” ACM Sigcomm, 2009.Google Scholar
V., Bahl, “The Promises and Challenges of the Wireless Frontier – from 600 MHz to 60 GHz,” IEEE DySPAN 2011, Plenary lecture, May 2011.Google Scholar
T., Banerjee, V., Sharma, V., Kavitha, and A. K., Jayaprakasam, “Generalized analysis of a distributed energy efficient algorithm for change detection,” IEEE Trans. Wireless Commun., 10, no. 1, 91–101, Jan. 2011.Google Scholar
J., Banks and R., Sundaram, “Switching costs and the Gittins index,” Econometrica, 62, no. 3, 687–694, May 1994.Google Scholar
M., Basseville and I. V., Nikiforov, Detection of Abrupt Changes – Theory and Application, Prentice-Hall, 1993.Google Scholar
D. S., Baum, H., El-Sallabi, T., Jämsä, et al., “Final report on link level and system level channel models,” WINNER, IST-2003-507581, D5–4, 2005.Google Scholar
D. S., Baum, D., Gore, R., Nabar, et al., “Measurements and characterization of broadband MIMO fixed wireless channels at 2.5 GHz,” Proc. ICPWC, Dec. 2000.Google Scholar
,BBN Technologies, “Next generation (XG) architecture and protocol development (XAP),” Tech. Rep., Aug. 2005.
,BBN Technologies, “The XG Vision–RFC,” Tech. Rep. www.ir.bbn.com/~ramanath/pdf/rfc_vision.pdf.
R., Bellman, Dynamic Programming, Princeton University Press, 2010.Google Scholar
P., Bello, “Characterization of randomly time-variant linear channels,” IEEE Trans. Commun., 11, no. 4, 360–393, Dec. 1963.Google Scholar
S., Benedetto and E., Biglieri, Principles of Digital Transmission With Wireless Applications. Kluwer Academic/Plenum Publishers, 1999.Google Scholar
J. E., Berg, J., Ruprecht, J. P., de Weck, and A., Mattsson, “Specular reflections from high-rise buildings in 900 MHz cellular systems,” Proc. IEEE Veh. Technol. Conf., pp. 594–599, 1991.Google Scholar
C., Bergljung and P., Karlsson, “Propagation characteristics for indoor broadband radio access networks in the 5 GHz band,” Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 612–616, 1998.Google Scholar
D. A., Berry and B., Fristedt, Bandit Problems: Sequential Allocation of Experiments, Chapman and Hall, 1985.Google Scholar
U., Berthold, F., Fu, M., van der Schaar, and F. K., Jondral, “Detection of spectral resources in cognitive radios using reinforcement learning,” Proc. 3rd IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2008), Chicago, IL, Oct. 14–17, 2008.Google Scholar
D. P., Bertsekas, Dynamic Programming and Optimal Control (3rd edn.), Vols. 1 and 2, Athena Scientific, 2007.Google Scholar
D., Bertsimas and J., Niño-Mora, “Conservations laws, extended polymatroids and multiarmed bandit problems; a polyhedral approach to indexable systems,” Math. Oper. Res., 21, no. 2, 257–306, May 1996.Google Scholar
E., Biglieri, R., Calderbank, A., Constantinides, A., Goldsmith, A., Paulraj, and H. V., Poor, MIMO Wireless Communications, Cambridge University Press, 2007.Google Scholar
E., Biglieri, J., Proakis, and S., Shamai (Shitz), “Fading channels: information theoretic and communication aspects,” IEEE Trans. Inf. Theory, 44, no. 6, 2619–2692, Oct. 1998.Google Scholar
S., Biswas and R., Morris, “Opportunistic routing in multi-hop wireless networks,” Proc. ACM SIGCOMM, 2004.Google Scholar
R. S., Blum, S. A., Kassam, and H. V., Poor, “Distributed detection with multiple sensors: Part II – advanced topics,” Proc. IEEE, 85, no. 1, 64–79, Jan. 1997.Google Scholar
R. S., Blum and B. M., Sadler, “Energy efficient signal detection in sensor networks using ordered transmissions,” IEEE Trans. Signal Process., 56, no. 7, 3229–3235, July 2008.Google Scholar
H., Bölcskei, R. U., Nabar, O., Oyman, and A. J., Paulraj, “Capacity scaling laws in MIMO relay networks,” IEEE Trans. Wireless Commun., 5, no. 6, 1433–1444, June 2006.Google Scholar
M., Bowling and M., Veloso, “Multiagent learning using a variable learning rate,” Artif. Intell., 136, no. 2, 215–250, Apr. 2002.Google Scholar
R., Branzei, D., Dimitrov, and S., Tijs, Models in Cooperative Game Theory, 2nd edition, Springer-Verlag, 2008.Google Scholar
V., Brik, E., Rozner, S., Banerjee, and P., Bahl, “DSAP: a protocol for coordinated spectrum access,” IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005, Nov. 2005, pp. 611–614.Google Scholar
J., Brito, “The spectrum commons in theory and practice,” Stanford Technology Law Review, Discussion Papers, 2007. stlr.stanford.edu/pdf/brito-commons.pdf.
R., Brodersen, A., Wolisz, D., Cabric, S. M., Mishra, and D., Willkomm, “CORVUS: a cognitive radio approach for usage of virtual unlicensed spectrum,” White Paper: Berkeley Wireless Research Center. bwrc.eecs.berkeley.edu/research/mcma/CR_White_paper_final1.pdf.
B. E., Brodsky and B. S., Darkhovsky, Nonparametric Methods in Change-Point Problems. Kluwer Academic Publishers, 1993.Google Scholar
B. E., Brodsky and B. S., Darkhovsky, “Minimax sequential tests for many composite hypothesis. I,” Theory Probab. Appl., 52, no. 4, 565–579, 2008.Google Scholar
B. E., Brodsky and B. S., Darkhovsky, “Minimax sequential tests for many composite hypothesis. II,” Theory Probab. Appl., 53, no. 1, 1–12, 2009.Google Scholar
I., Broustis, J., Eriksson, S., Krishnamurthy, and M., Faloutsos, “A blueprint for a manageable and affordable wireless testbed: design, pitfalls and lessons learned,” 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, TridentCom 2007, May 2007, pp. 1–6.Google Scholar
T. X., Brown, “An analysis of unlicensed device operation in licensed broadcast service bands,” in Proc. 1st IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005), Baltimore, MD, Nov. 8–11, 2005, pp. 11–29.Google Scholar
T., Brown and A., Sethi, “Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment,” 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom., Aug. 2007, pp. 456–464.Google Scholar
M., Buddhikot, “Understanding dynamic spectrum access: models, taxonomy and challenges,” 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN, Apr. 2007.Google Scholar
M., Buddhikot, P., Kolodzy, S., Miller, K., Ryan, and J., Evans, “DIMSUMNet: new directions in wireless networking using coordinated dynamic spectrum access,” IEEE WoWMoM, June 2005.Google Scholar
T. N., Bui, V., Krishnamurthy, and H. V., Poor, “Online Bayesian activity detection in DS/CDMA network,” IEEE Trans. Signal Process., 53, no. 1, 371–375, Jan. 2005.Google Scholar
L., Busşoniu, R., Babušska, and B., De Schutter, “A comprehensive survey of multiagent reinforcement learning,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., 38, no. 2, 156–172, Mar. 2008.Google Scholar
L., Busşoniu, R., Babušska, B., De Schutter, and D., Ernst, Reinforcement Learning and Dynamic Programming Using Function Approximators, CRC Press, 2010.Google Scholar
V. R., Cadambe and S. A., Jafar, “Interference alignment and degrees of freedom of the K-user interference channel,” IEEE Trans. Inf. Theory, 54, no. 8, 3425–3441, Aug. 2008.Google Scholar
V. R., Cadambe and S. A., Jafar, “Parallel Gaussian interference channels are not always separable,” IEEE Trans. Inf. Theory, 55, no. 9, 3983–3990, Sep. 2009.Google Scholar
G., Calcev, D., Chizhik, B., Goransson, et al., “A Wideband Spatial Channel Model for System-Wide Simulations,” IEEE Trans. Veh. Technol., 56, no. 2, 389–403, Mar. 2007.Google Scholar
Y., Cao and B., Chen, “Interference channel with one cognitive transmitter,” Proc. of the Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, Oct. 26–29, 2008.Google Scholar
A. B., Carleial, “A case where interference does not reduce capacity,” IEEE Trans. Inf. Theory, 21, no. 5, 569–570, Sep. 1975.Google Scholar
A. B., Carleial, “Interference channels,” IEEE Trans. Inf. Theory, 24, no. 1, 60–70, Jan. 1978.Google Scholar
D., Cassioli, M. Z., Win, and A., Molisch, “The ultra-wide bandwidth indoor channel: from statistical model to simulations”, IEEE J. Sel. Areas Commun., 20, no. 6, 1247–1257, Aug. 2002.Google Scholar
H., Celebi and H., Arslan, “Adaptive positioning systems for cognitive radios,” Proc. 2nd IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2007), Dublin, Ireland, Apr. 17–20, 2007, pp. 78–84.Google Scholar
H., Celebi and H., Arslan, “Cognitive positioning systems,” IEEE Trans. Wireless Commun., 6, no. 12, 4475–4483, Dec. 2007.Google Scholar
S., Chaudhari and V., Koivunen, “Effect of quantization and channel errors on collaborative spectrum sensing,” Proc. 43rd Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Nov. 1–4, 2009, pp. 528–533.Google Scholar
S., Chaudhari, V., Koivunen, and H. V., Poor, “Autocorrelation-based decentralized sequential detection of OFDM signals in cognitive radios,” IEEE Trans. Signal Process., 57, no. 7, 2690–2700, July 2009.Google Scholar
S., Chaudhari, J., Lundén, and V., Koivunen, “BEP walls for collaborative spectrum sensing,” Proc. 36th IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, May 22–27, 2011.Google Scholar
S., Chaudhari, J., Lundén, and V., Koivunen, “Performance limitations for cooperative spectrum sensing with reporting channel errors,” Proc. 22nd IEEE Int. Symp. Personal, Indoor, and Mobile Radio Communications (PIMRC 2011), Toronto, Canada, Sep. 11–14, 2011.Google Scholar
S., Chaudhari, J., Lundén, V., Koivunen, and H. V., Poor, “Cooperative sensing with imperfect reporting channels: Hard decisions or soft decisions?,” IEEE Trans. Signal Process., 60, no. 1, 18–28, Jan. 2012.Google Scholar
B., Chen and H., Wang, “Maximum likelihood estimation of OFDM carrier frequency offset,” in IEEE International Conference on Communications, 2002. ICC 2002, 1, May 2002, 49–53.Google Scholar
B., Chen and P.K., Willett, “On the optimality of the likelihood-ratio test for local sensor decision rules in the presence of nonideal channels,” IEEE Trans. Inf. Theory, 51, no. 2, 693–699, Feb. 2005.Google Scholar
H., Chen, B., Chen, and P. K., Varshney, “Further results on the optimality of the likelihood-ratio test for local sensor decision rules in the presence of nonideal channels,” IEEE Trans. Inf. Theory, 55, no. 2, 828–832, Feb. 2009.Google Scholar
M., Chen and H., Asplund, “Measurements and models for direction of arrival of radio waves in LOS in urban microcells,” Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 100–104, 2001.Google Scholar
R., Chen, J.-M., Park, and K., Bian, “Robust distributed spectrum sensing in cognitive radio networks,” Proc. 27th IEEE Conf. Computer Communications (INFOCOM 2008), Phoenix, AZ, Apr. 13–18, 2008.Google Scholar
R., Chen, J.-M., Park, and J., Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE J. Sel. Areas Commun., 26, no. 1, 25–37, Jan. 2008.Google Scholar
S. H., Chen, J. S., Row, and K. L., Wong, “Reconfigurable square-ring patch antenna with pattern diversity,” IEEE Trans. Antennas and Propag., 55, no. 2, 472–475, Feb. 2007.Google Scholar
Y., Chen, “Optimum number of secondary users in collaborative spectrum sensing considering resource usage efficiency,” IEEE Commun. Lett., 12, no. 12, 877–879, Dec. 2008.Google Scholar
Y., Chen, Q., Zhao, and A., Swami, “Joint design and separation principle for opportunistic spectrum access in the presence of sensing errors,” IEEE Trans. Inf. Theory, 54, no. 5, 2053–2071, May 2008.Google Scholar
Z., Chen, Z., Hu, and R. C., Qui, “Quickest spectrum detection using hidden Markov model for cognitive radio,” Proc. IEEE Military Communications Conf. (MILCOM 2009), Boston, MA, Oct. 18–21, 2009.Google Scholar
M., Chiani and A., Giorgetti, “Coexistence between UWB and narrow-band wireless communication systems,” Proc. IEEE, 97, no. 2, 231–254, Feb. 2009.Google Scholar
K. W., Choi, W. S., Jeon, and D. G., Jeong, “Sequential detection of cyclostationary signal for cognitive radio systems,” IEEE Trans. Wireless Commun., 8, no. 9, 4480–4485, Sep. 2009.Google Scholar
C.-C., Chong, C.-M., Tan, D. I., Laurenson, S., McLaughlin, M. A., Beach, and A. R., Nix, “A new statistical wideband spatio-temporal channel model for 5-GHz band WLAN systems,” IEEE J. Sel. Areas Commun., 21, no. 2, 139–150, Feb. 2003.Google Scholar
Cisco, , “Cisco visual networking index: Global mobile data traffic forecast update, 2010–2015,” Tech. Rep., 2011. www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.pdf.
T. C., Clancy, “Achievable capacity under the interference temperature model,” Proc. of the IEEE International Conference on Computer Communications (INFOCOM), Anchorage, AK, May 6–12 2007, pp. 794–802.Google Scholar
T. C., Clancy, “Formalizing the interference temperature model,” J. Wireless Commun. Mobile Comput., 7, no. 9, 1077–1086, Nov. 2007.Google Scholar
T. C., Clancy, “On the use of interference temperature for dynamic spectrum access,” Ann. Telecomm., 64, no. 7–8, 573–592, Aug. 2009.Google Scholar
T. C., Clancy and D., Walker, “Spectrum shaping for interference management in cognitive radio networks,” SDR Forum Technical Conference, Orlando, FL, Nov. 13–17, 2006.Google Scholar
R. H., Clarke, “A statistical theory of mobile radio reception,” Bell Syst. Tech. J., 47, no. 6, 957–1000, 1968.Google Scholar
“Cognitive radio network testbed (CORNET),” cornet.wireless.vt.edu/.
“Cognitive Radio Research at Nokia Research Center,” www.research.nokia.com/cognitive_radio.
R. H., Coase, “The Federal Communications Commission,” Journal of Law and Economics, 2, 1–40, Oct. 1959.Google Scholar
C., Cordeiro and K., Challapali, “C-MAC: a cognitive MAC protocol for multi-channel wireless networks,” IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Apr. 2007, pp. 147–157.Google Scholar
C. B., Cormio and K. R. A., Chodhury, “A survey on MAC protocols for cognitive radio networks,” Elsevier J. Ad Hoc Netw., 7, no. 7, 1315–1329, July 2009.Google Scholar
M. H. M., Costa, “Writing on dirty paper,” IEEE Trans. Inf. Theory, 29, no. 3, 439–441, May 1983.Google Scholar
M. H. M., Costa and A. El, Gamal, “The capacity region of the discrete memoryless interference channel with strong interference,” IEEE Trans. Inf. Theory, 33, no. 5, 710–711, Sep. 1987.Google Scholar
T., Cover, “Broadcast channels,” IEEE Trans. Inf. Theory, 18, no. 1, 2–14, Jan. 1972.Google Scholar
T., Cover and A. El, Gamal, “Capacity theorems for the relay channel,” IEEE Trans. Inf. Theory, 25, no. 5, 572–584, Sep. 1979.Google Scholar
T., Cover and J., Thomas, Elements of Information Theory, 2nd edition, J. Wiley & Sons, 2006.Google Scholar
D. C., Cox, “910 MHz urban mobile radio propagation: multipath characteristics in New York City,” IEEE Trans. Commun., 21, no. 11, 1188–1194, Nov. 1973.Google Scholar
R. J. M., Cramer, R. A., Scholtz, and M. M. Z., Win, “Evaluation of an ultra-wide-band propagation channel,” IEEE Trans. Antennas Propag., 50, no. 5, 561–570, May 2002.Google Scholar
I., Cuinas and M. G., Sanchez, “Measuring, modeling, and characterizing of indoor radio channel at 5.8 GHz,” IEEE Trans. Veh. Technol., 50, no. 2, 526–535, Mar. 2001.Google Scholar
D., Čabrić, “Addressing feasibility of cognitive radios,” IEEE Signal Processing Mag., 25, no. 6, 85–93, Nov. 2008.Google Scholar
D., Čabrić, S. M., Mishra, and R. W., Brodersen, “Implementation issues in spectrum sensing for cognitive radios,” in Proc. 38th Asilomar Conference on Signals, Systems and Computers, 2004.
A., Damnjanović, J., Montojo, Y., Wei, et al., “A survey on 3GPP heterogeneous networks,” IEEE Trans. Commun., 18, no. 3, 10–21, June 2011.Google Scholar
A. V., Dandawaté and G. B., Giannakis, “Statistical tests for presence of cyclostationarity,” IEEE Trans. Signal Process., 42, no. 9, 2355–2369, Sep. 1994.Google Scholar
S., Dayanik, C., Goulding, and H. V., Poor, “Bayesian sequential change diagnosis,” Math. Oper. Res., 33, no. 2, 475–496, May 2008.Google Scholar
S., Dayanik, W., Powell, and K., Yamazaki, “Index policies for discounted bandit problems with availability constraints,” Adv. Appl. Prob., 40, no. 2, 377–400, June 2008.Google Scholar
“Delay dispersion in UWB residential/office environments,” IEEE 802–15–3a.
“Delay dispersion in UWB channels (office, residential, outdoor, industrial),” IEEE 802–15–4a.
D., Devasirvatham, “Time delay spread and signal level measurements of 850 MHz radio waves in building environments,” IEEE Trans. Antennas Propag., 34, no. 11, 1300–1305, Nov. 1986.Google Scholar
D., Devasirvatham, “A comparison of time delay spread and signal level measurements within two dissimilar office buildings,” IEEE Trans. Antennas Propag., 35, no. 3, 319–324, Mar. 1987.Google Scholar
N., Devroye, P., Mitran, and V., Tarokh, “Achievable rates in cognitive radio channels,” IEEE Trans. Inf. Theory, 52, no. 5, 1813–1827, May 2006.Google Scholar
N., Devroye, M., Vu, and V., Tarokh, “Cognitive radio networks,” IEEE Signal Processing Mag., 25, no. 6, 12–23, Nov. 2008.Google Scholar
M., Dianati, X., Ling, K., Naik, and X., Shen, “A node-cooperative ARQ scheme for wireless ad hoc networks,” IEEE Trans. Veh. Technol., 55, no. 3, 1032–1044, May 2006.Google Scholar
M., Di Felice, K. R., Chowdhury, W., Meleis, and L., Bononi, “To sense or to transmit: a learning-based spectrum management scheme for cognitive radio mesh networks,” Proc. 5th IEEE Workshop Wireless Mesh Networks (WIMESH 2010), Boston, MA, June 21, 2010.Google Scholar
F. F., Digham, M.-S., Alouini, and M. K., Simon, “On the energy detection of unknown signals over fading channels,” Proc. IEEE Int. Conf. Communications (ICC 2003), Anchorage, AK, May 11–15, 2003, pp. 3575–3579.Google Scholar
F. F., Digham, M.-S., Alouini, and M. K., Simon, “On the energy detection of unknown signals over fading channels,” IEEE Trans. Commun., 55, no. 1, 21–24, Jan. 2007.Google Scholar
C., Doerr, M., Neufeld, J., Fifield, T., Weingart, D., Sicker, and D., Grunwald, “Multimac – an adaptive MAC framework for dynamic radio networking,” IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005, Nov. 2005, pp. 548–555.Google Scholar
M., Dresher, “Moment spaces and inequalities,” Duke Math. J., 20, 261–271, June 1953.Google Scholar
P. E., Driessen, “Prediction of multipath delay profiles in mountainous terrain,” IEEE J. Sel. Areas Commun., 18, no. 3, 336–346, Mar. 2000.Google Scholar
G. D., Durgin, V., Kukshya, and T. S., Rappaport, “Wideband measurements of angle and delay dispersion for outdoor and indoor peer-to-peer radio channels at 1920 MHz,” IEEE Trans. Antennas Propag., 51, no. 5, 936–944, May 2003.Google Scholar
M., Effros, A., Goldsmith, and Y., Liang, “Generalizing capacity: new definitions and capacity theorems for composite channels,” IEEE Trans. Inf. Theory, 56, no. 7, July 2010.Google Scholar
A. El, Gamal, “On information flow in relay networks,” Proc. of the IEEE National Telecommunications Conference, 2, Nov. 1981, D4.1.1–D4.1.4.Google Scholar
A. El, Gamal and Y.-H., Kim, Network Information Theory, Cambridge University Press, 2012.Google Scholar
A. El, Gamal, J., Mammen, B., Prabhakar, and D., Shah, “Optimal throughput-delay scaling in wireless networks – part I: the fluid model,” IEEE Trans. Inf. Theory, 52, no. 6, 2568–2592, June 2006.Google Scholar
H. El, Gamal, G., Caire, and M. O., Damen, “The MIMO ARQ channel: diversitymultiplexing-delay tradeoff,” IEEE Trans. Inf. Theory, 52, no. 8, 3601–3621, Aug. 2006.Google Scholar
“End-to-end efficiency project,” ict-e3.eu/project/overview/overview.html.
V., Erceg, K.V.S., Hari, M. S., Smith, et al., “Channel models for fixed wireless applications,” IEEE 802.16d-03/34.
V., Erceg, L., Schumacher, P., Kyritsi, et al., “TGn channel models,” IEEE 802.11-03/940r4, May 2004.Google Scholar
V., Erceg, L. J., Greenstein, S. Y., Tjandra, et al., “An empirically based path loss model for wireless channels in suburban environments,” IEEE J. Sel. Areas Commun., 17, no. 7, 1205–1211, Jul. 1999.Google Scholar
V., Erceg, D. G., Michelson, S. S., Ghassemzadeh, et al., “A model for the multipath delay profile of fixed wireless channels,” IEEE J. Sel. Areas Commun., 17, no. 3, 399–410, Mar. 1999.Google Scholar
R., Etkin, D. N. C., Tse, and H., Wang, “Gaussian interference channel capacity to within one bit,” IEEE Trans. Inf. Theory., 54, no. 12, 5534–5562, May 2008.Google Scholar
,European Telecommunication Standard, “Digital Audio Broadcasting (DAB) to mobile, portable and fixed receivers,” ETSI, Tech. Rep., May 1997.Google Scholar
M., Failli (ed.), Final report of COST 207, “Digital land mobile radio communications,” Commission of the European Communities, 1989.
S., Fazeli-Dehkordy, K. N., Plataniotis, and S., Pasupathy, “Wide-band collaborative spectrum search strategy for cognitive radio networks,” IEEE Trans. Signal Process., 59, no. 8, 3903–3914, Aug. 2011.Google Scholar
,Federal Communications Commission, Establishment of an Interference Temperature Metric to Quantify and Manage Interference and to Expand Available Unlicensed Operation in Certain Fixed, Mobile and Satellite Frequency Bands. ET Docket No. 03-237, Nov. 2003.Google Scholar
,Federal Communications Commission, “Notice of proposed rule making,” FCC, ET Docket no. 04-113, May 2004. www.naic.edu/.phil/rfi/fccactions/FCC-04-113A1.pdf.
,Federal Communications Commission, “Second memorandum opinion and order,” FCC, Tech. Rep., Sep. 2010. transition.fcc.gov/Daily_Releases/Daily_Business/2010/db0923/FCC-10-174A1.pdf
,Federal Communications Commission Spectrum Policy Task Force, Report of the Spectrum Efficiency Working Group, Technical Report 02-135, (Nov. 2002). www.fcc.gov/sptf/files/SEWGFinalReport_1.pdf.
G., Fellouris and G. V., Moustakides, “Decentralized sequential hypothesis testing using asynchronous communication,” IEEE Trans. Inf. Theory, 57, no. 1, 534–548, Jan. 2011.Google Scholar
M. J., Feuerstein, K. L., Blackard, T. S., Rappaport, S. Y., Seidel, and H. H., Xia, “Path loss, delay spread, and outage models as functions of antenna height for microcellular system design,” IEEE Trans. Veh. Technol., 43, no. 3, 487–498, Aug. 1994.Google Scholar
S., Filippi, O., Cappé, F., Clérot, and E., Moulines, “A near optimal policy for channel allocation in cognitive radio,” Recent Advances in Reinforcement Learning: 8th European Workshop (EWRL 2008), Villeneuve d'Ascq, France, June 30–July 4, 2008, pp. 69–81.Google Scholar
S., Filippi, O., Cappé, and A., Garivier, “Optimally sensing a single channel without prior information: the tiling algorithm and regret bounds,” IEEE J. Sel. Topics Signal Process., 5, no. 1, 68–76, Feb. 2011.Google Scholar
F., Fitzek and M., Katz, eds., Cognitive Wireless Networks: Concepts, Methodologies and Visions inspiring the age of Enlightenment of Wireless Communications, Springer, 2007.
B. H., Fleury, “An uncertainty relation for WSS processes and its application toWSSUS systems,” IEEE Trans. Commun., 44, no. 12, 1632–1634, Dec. 1996.Google Scholar
B. H., Fleury, “First- and second-order characterization of direction dispersion and space selectivity in the radio channel,” IEEE Trans. Information Theory, 46, no. 6, 2027–2044, Sep. 2000.Google Scholar
H. T., Friis, “A note on a simple transmission formula,” Proc. IRE, 34, no. 5, 254, May 1946.Google Scholar
J., Fuhl, A. F., Molisch, and E., Bonek, “Unified channel model for mobile radio systems with smart antennas,” IEE Proc. Radar, Sonar and Navigation, 145, no. 1, 32–41, Feb. 1998.Google Scholar
Y., Gai, B., Krishnamachari, and R., Jain, “Learning multiuser channel allocations in cognitive radio networks: a combinatorial multi-armed bandit formulation,” Proc. IEEE Int. Symp. Dynamic Spectrum Access Networks (DySPAN 2010), Singapore, Apr. 6–9, 2010.Google Scholar
R. G., Gallager, Information Theory and Reliable Communication, J. Wiley & Sons, 1968.Google Scholar
F., Gao, W., Yuan, W., Liu, W., Cheng, and S., Wang, “A robust and efficient cooperative spectrum sensing scheme in cognitive radio networks,” Proc. IEEE Int. Conf. Communications (ICC 2010), Cape Town, South Africa, May 23–27, 2010.Google Scholar
W. A., Gardner, “Signal interception: a unifying theoretical framework for feature detection,” IEEE Trans. Commun., 36, no. 8, 897–906, Aug. 1988.Google Scholar
W. A., Gardner, “Exploitation of spectral redundancy in cyclostationary signals,” IEEE Signal Process. Mag., 8, no. 2, 14–36, Apr. 1991.Google Scholar
W. A., Gardner (ed.), Cyclostationarity in Communications and Signal Processing. IEEE Press, 1994.
M., Gastpar, “On capacity under receive and spatial spectrum-sharing constraints,” IEEE Trans. Inf. Theory, 53, no. 2, 471–487, Feb. 2007.Google Scholar
S. I., Gelfand and M. S., Pinsker, “Coding for channel with random parameters,” Probl. Peredachi Informatsii, 9, no. 1, 19–31, Jan. 1980.Google Scholar
C., Gerami, Design Methodology for Backhaul and Distribution Networks using TV White Spaces, M.S. Dissertation, Rutgers University, May 2011.Google Scholar
C., Gerami, N., Mandayam, and L., Greenstein, “Backhauling in TV white spaces,” 2010 IEEE Global Telecommunications Conference, Dec. 2010, pp. 1–6.Google Scholar
S., Gezici, H., Celebi, H. V., Poor, and H., Arslan, “Fundamental limits on time delay estimation in dispersed spectrum cognitive radio systems,” IEEE Trans. Wireless Commun., 8, no. 1, 78–83, Jan. 2009.Google Scholar
A., Ghasemi and E., Sousa, “Fundamental limits of spectrum-sharing in fading environments,” IEEE Trans. Wireless Commun., 6, no. 2, 649–658, Feb. 2007.Google Scholar
A., Ghasemi and E. S., Sousa, “Spectrum sensing in cognitive radio networks: the cooperation-processing tradeoff,” Wirel. Commun. Mob. Comput., 7, no. 9, 1049–1060, Sept. 2007.Google Scholar
A., Ghasemi and E. S., Sousa, “Interference aggregation in spectrum-sensing cognitive wireless networks,” IEEE J. Sel. Topics Signal Process., 2, no. 1, 41–56, Feb. 2008.Google Scholar
A., Ghasemi and E. S., Sousa, “Spectrum sensing in cognitive radio networks: Requirements, Challenges and design trade-offs,” IEEE Commun. Mag., 46, no. 4, 32–39, Apr. 2008.Google Scholar
S. S., Ghassemzadeh, L. J., Greenstein, T., Sveinsson, and V., Tarokh, “UWB delay profile models for residential and commercial indoor environments,” IEEE Trans. Veh. Technol., 54, no. 4, 1235–1244, July 2005.Google Scholar
S. S., Ghassemzadeh, R., Jana, C.W., Rice, W., Turin, and V., Tarokh, “Measurement and modeling of an ultra-wide bandwidth indoor channel,” IEEE Trans. Commun., 52, no. 10, 1786–1796, Oct. 2004.Google Scholar
B. K., Ghosh, Sequential Tests of Statistical Hypothesis, Addison-Wesley, 1970.Google Scholar
R., Gibbons, A Primer in Game Theory, Pearson Education Limited, 1992.Google Scholar
J. C., Gittins, “Bandit processes and dynamic allocation indices,” J. Roy. Statist. Soc. Ser.B, 41, no. 2, 148–177, 1979.Google Scholar
J. C., Gittins and D. M., Jones, “A dynamic allocation index for the sequential design of experiments,” in J., Gani (ed.) Progress in Statistics, North Holland, pp. 241–266, 1974.Google Scholar
K. D., Glazebrook, D., Ruiz-Hernandez, and C., Kirkbride, “Some indexable families of restless bandit problems,” Adv. Appl. Prob., 38, no. 3, 643–672, 2006.Google Scholar
A. A., Glazunov, H., Asplund, and J. E., Berg, “Statistical analysis of measured shortterm impulse response functions of 1.88 GHz radio channels in Stockholm with corresponding channel model,” Proc. IEEE Veh. Technol. Conf., pp. 107–111, 1999.Google Scholar
A., Goldsmith, Wireless Communications, Cambridge University Press, 2005.Google Scholar
A., Goldsmith, M., Effros, R., Koetter, M., Médard, A., Ozdaglar, and L., Zheng, “Beyond Shannon: the quest for fundamental performance limits of wireless ad hoc networks,” IEEE Commun. Mag., 49, no. 5, 195–205, May 2011.Google Scholar
A. J., Goldsmith and L. J., Greenstein, “A measurement-based model for predicting coverage areas of urban microcells”, IEEE J. Sel. Areas Commun., 11, no. 7, 1013–1023, Sept. 1993.Google Scholar
A. J., Goldsmith, S. A., Jafar, N., Jindal, and S., Vishwanath, “Capacity limits of MIMO channels,” IEEE J. Sel. Areas Commun., 21, no. 5, 684–702, June 2003.Google Scholar
A., Goldsmith, S., Jafar, I., Marić, and S., Srinivasa, “Breaking spectrum gridlock with cognitive radios: an information theoretic perspective,” Proc. IEEE, 97, no. 5, 894–914, May 2009.Google Scholar
F., Graziosi and F., Santucci, “A general correlation model for shadow fading in mobile radio systems,” IEEE Commun. Letters, 6, no. 3, 102–104, 2002.Google Scholar
L. J., Greenstein and V., Erceg, “Gain reductions due to scatter on wireless paths with directional antennas,” IEEE Commun. Letters, 3, no. 6, 169–171, Jun. 1999.Google Scholar
L. J., Greenstein, V., Erceg, Y. S., Yeh, and M. V., Clark, “A new path-gain/delay-spread propagation model for digital cellular channels,” IEEE Trans. Veh. Technol., 46, no. 2, 477–485, May 1997.Google Scholar
L. J., Greenstein, S. S., Ghassemzadeh, V., Erceg, and D. G., Michelson, “Ricean Kfactors in narrowband fixed wireless channels: theory, experiments and statistical models,” IEEE Trans. Veh. Technol., 58, no. 9, 4000–4012, Oct. 2009.Google Scholar
L. J., Greenstein, S. S., Ghassemzadeh, S. C., Hong, and V., Tarokh, “Comparison study of UWB indoor channel models,” IEEE Trans. Wireless Commun., 6, no. 1, 128–135, Jan. 2007.Google Scholar
M., Grossglauser and D. N. C., Tse, “Mobility increases the capacity of ad hoc wireless networks,” IEEE/ACM Trans. Netw., 10, no. 4, 477–486, Aug. 2002.Google Scholar
P., Grover and A., Sahai, “What is needed to exploit knowledge of primary transmissions?,” Proc. of the IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Dublin, Ireland, Apr. 17–20, 2007, pp. 462–471.Google Scholar
M., Gudmundson, “Correlation model for shadow fading in mobile radio systems,” Electronics Letters, 27, no. 23, 2145–2146, 7 Nov. 1991.Google Scholar
M., Guerriero, V., Pozdnyakov, J., Glaz, and P., Willett, “A repeated significance test with applications to sequential detection in sensor networks,” IEEE Trans. Signal Process., 58, no. 7, 3426–3435, July 2010.Google Scholar
Guidelines for Evaluation of Radio Transmission Technologies for IMT-2000, Recommendation ITU-R M.1225, 1997.
P., Gupta and P. R., Kumar, “The capacity of wireless networks,” IEEE Trans. Inf. Theory, 42, no. 2, 388–404, Mar. 2000.Google Scholar
P., Gupta and P. R., Kumar, “Towards an information theory of large networks: An achievable rate region,” IEEE Trans. Inf. Theory, 49, no. 8, 1877–1894, Aug. 2003.Google Scholar
O., Hadjiliadis, H., Zhang, and H. V., Poor, “One shot schemes for decentralized quickest change detection,” IEEE Trans. Inf. Theory, 55, no. 7, 3346–3359, July 2009.Google Scholar
A., Haghparast, T., Abrudan, and V., Koivunen, “OFDM ranging in multipath channels using time reversal method,” Proc. 10th IEEE Int. Workshop Signal Processing Advances for Wireless Communications (SPAWC 2009), Perugia, Italy, June 21–24, 2009, pp. 568–572.Google Scholar
P. S., Hall, P., Gardner, J., Kelly, E., Ebrahimi, M. R., Hamid, and F., Ghanem, “Antenna challenges in cognitive radio,” Proc. ISAP 08, Oct. 2008, pp. 141–144.Google Scholar
D., Hampicke, A., Richter, A., Schneider, G., Sommerkorn, R. S., Thoma, and U., Trautwein, “Characterization of the directional mobile radio channel in industrial scenarios, based on wideband propagation measurements,” Proc. Veh. Technol. Conf., pp. 2258–2262, 1999.Google Scholar
B., Hamdaoui, P., Venkatraman, and M., Guizani, “Opportunistic exploitation of bandwidth resources through reinforcement learning,” Proc. IEEE Global Communications Conf. (GLOBECOM 2009), Honolulu, HI, Nov. 30–Dec. 4, 2009.Google Scholar
T., Han and K., Kobayashi, “A new achievable rate region for the interference channel,” IEEE Trans. Inf. Theory, 27, no. 1, 49–60, Jan. 1981.Google Scholar
Z., Han, R., Zheng, and H. V., Poor, “Repeated auctions with Bayesian nonparametric learning for spectrum access in cognitive radio networks,” IEEE Trans. Wireless Commun., 10, no. 2, 890–900, Mar. 2011.Google Scholar
L., Hanzo and T., Keller, OFDM and MC-CDMA: a Primer, IEEE Press, J. Wiley & Sons, 2006.Google Scholar
G., Hardin, “Tragedy of the commons,” Science, pp. 1243–1248, Dec. 1968.Google ScholarPubMed
K. V. S., Hari and C., Bushue, “Interim channel models for G2 MMDS fixed wireless applications,” IEEE 802.16.3c-00/49r2.
F., Harryson, J., Medbo, A. F., Molisch, et al., “Efficient experimental evaluation of MIMO and set with user influence,” IEEE Trans. Wireless Commun., 9, no. 2, 853–863, Feb. 2010.Google Scholar
S., Hart and A., Mas-Colell, “A reinforcement procedure leading to correlated equilibrium,” in G., Debreu,W., Neuefeind, and W., Trockel (eds.), Economics Essays, pp. 181–200, Springer, 2001.Google Scholar
H., Hashemi and D., Tholl, “Statistical modeling and simulation of the RMS delay spread of indoor radio propagation channels,” IEEE Trans. Veh. Technol., 43, no. 1, 110–120, Feb. 1994.Google Scholar
M., Hata, “Empirical formula for propagation loss in land mobile radio services,” IEEE Trans. Veh. Technol., 29, no. 3, 317–325, Aug. 1980.Google Scholar
M. H., Hayes, Statistical Digital Signal Processing and Modeling, J. Wiley & Sons, 1996.Google Scholar
S., Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., 23, no. 2, 201–220, Feb. 2005.Google Scholar
S., Haykin, D. J., Thomson, and J. H., Reed, “Spectrum sensing for cognitive radio,” Proc. IEEE, 97, no. 5, 849–877, May 2009.Google Scholar
S. P., Herath, N., Rajatheva, and C., Tellambura, “Energy detection of unknown signals in fading and diversity reception,” IEEE Trans. Commun., 59, no. 9, 2443–2453, Sep. 2011.Google Scholar
W., Hirt and J. L., Massey, “Capacity of the discrete-time Gaussian channel with intersymbol interference,” IEEE Trans. Inf. Theory, 34, no. 3, 380–388, May 1998.Google Scholar
M., Hong and A., Garcia, “Equilibrium pricing of interference in cognitive radio networks,” IEEE Trans. Signal Process., 59, no. 12, 6058–6072, Dec. 2011.Google Scholar
B., Horine and D., Turgut, “Link rendezvous protocol for cognitive radio networks,” IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2007, Apr. 2007, pp. 444–447.Google Scholar
S. H., Hsu and K., Chang, “A novel reconfigurable microstrip antenna with switchable circular polarization,” IEEE Antennas and Wireless Propag. Lett., 6, 160–162, 2007.Google Scholar
T.-C., Hsu, T.-Y., Wang, and Y.-W. P., Hong, “Collaborative change detection for efficient spectrum sensing in cognitive radio networks,” Proc. 71st IEEE Vehicular Technology Conf. (VTC 2010-Spring), Taipei, Taiwan, May 16–19, 2010.Google Scholar
J., Huang, R. A., Berry, and M. L., Honig, “Spectrum sharing with distributed interference compensation,” Proc. of the IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Baltimore, MD, Nov. 8–11, 2005, pp. 88–93.Google Scholar
,Huawei Technolgies and UESTC, “Sensing schemes for DVB-T,” IEEE Std. 802.22-06/0127r1, July 2006.Google Scholar
G. H., Huff, J., Feng, S., Zhang, and J. T., Bernhard, “A novel radiation pattern and frequency reconfigurable single turn square spiral microstrip antenna,” IEEE Trans. Microw. Wireless Compon. Lett., 13, no. 2, 57–59, Feb. 2003.Google Scholar
A. M., Hussain, “Multisensor distributed sequential systems,” IEEE Trans. Aerosp. Electron. Syst., 30, no. 3, 698–708, July 1994.Google Scholar
IEEE 802–11, “Wireless LAN medium access control (MAC) and physical layer (PHY) specifications,” Tech. Rep., June 2007.
,IEEE 802–16.j standardization group, “Multi-hop relay system evaluation methodology (channel model and performance metric),” IEEE 802.16j-06/013r3, Feb. 2, 2007.Google Scholar
Ö., Ileri and N., Mandayam, “Dynamic spectrum access models: toward an engineering perspective in the spectrum debate,” IEEE Commun. Magazine, 46, no. 1, 153–160, Jan. 2008.Google Scholar
Ö., Ileri, D., Samardzija, T., Sizer, and N., Mandayam, “Demand responsive pricing and competitive spectrum allocation via a spectrum policy server,” Proc. IEEE DySPAN, Nov. 2005, Baltimore, MD.Google Scholar
T., Jaakkola, M. I., Jordan, and S. P., Singh, “On the convergence of stochastic iterative dynamic programming algorithms,” Neural Comput., 6, 1185–1201, 1994.Google Scholar
S. A., Jafar and S., Shamai (Shitz), “Degrees of freedom region for the MIMO X channel,” IEEE Trans. Inf. Theory, 54, no. 1, 151–170, Jan. 2008.Google Scholar
S. A., Jafar and S., Srinivasa, “Capacity limits of cognitive radio with distributed and dynamic spectral activity,” IEEE J. Sel. Areas Commun., 25, no. 3, 529–537, Apr. 2007.Google Scholar
W. C., Jakes, Microwave Mobile Communications, J. Wiley & Sons, 1974 (Reprinted by IEEE Press, 1994).Google Scholar
A. K., Jayaprakasam and V., Sharma, “Sequential detection based cooperative spectrum sensing algorithms in cognitive radio,” Proc. 1st IEEE UK-India Int. Workshop Cognitive Wireless Systems (UKIWCWS 2009), IIT Delhi, India, Dec. 11–12, 2009.Google Scholar
A. K., Jayaprakasam, V., Sharma, C. R., Murthy, and P., Narayanan, “Cyclic prefix based cooperative sequential spectrum sensing algorithms for OFDM,” Proc. IEEE Int. Conf. Communication (ICC 2010), Cape Town, South Africa, May 2010.Google Scholar
S.-W., Jeon, N., Devroye, M., Vu, S.-Y., Chung, and V., Tarokh, “Cognitive networks achieve throughput scaling of a homogeneous network,” IEEE Trans. Inf. Theory, 57, no. 8, 5103–5115, Aug. 2011.Google Scholar
H., Jiang, L., Lai, R., Fan, and H. V., Poor, “Optimal selection of channel sensing order in cognitive radio,” IEEE Trans. Wireless Commun., 8, no. 1, 297–307, Jan. 2009.Google Scholar
J., Jiang, I., Marić, A., Goldsmith, S., Shamai (Shitz), and S., Cui, “On the capacity of a class of cognitive Z-interference channels,” Proc. of the IEEE International Conference on Communications (ICC), Kyoto, Japan, June 5–9, 2011.Google Scholar
J., Jiang, Y., Xin, and H., Garg, “Interference channels with common information,” IEEE Trans. Inf. Theory, 54, no. 1, 171–187, Jan. 2008.Google Scholar
X., Jing and D., Raychaudhuri, “Global control plane architecture for cognitive radio networks,” IEEE International Conference on Communications, 2007. ICC '07, June 2007, pp. 6466–6470.Google Scholar
A., Jovičić and P., Viswanath, “Cognitive radio: an information-theoretic perspective,” IEEE Trans. Inf. Theory, 55, no. 9, 3945–3958, Sep. 2009.Google Scholar
T., Jun, “A survey on the bandit problem with switching costs,” De Economist, 152, no. 4, 513–541, 2004.Google Scholar
L. P., Kaebling, M. L., Littman, and A. W., Moore, “Reinforcement learning: a survey,” J. Artif. Intell. Res., 4, no. 1, 237–285, 1996.Google Scholar
P., Kaewprapha, R., Wu, B. C., Ng, and T. J., Li, “Cooperative spectrum sensing for cognitive radios: bounds and algorithms,” Proc. IEEE Wireless Communications and Networking Conf. (WCNC 2010), Sydney, Australia, Apr. 18–21, 2010, pp. 1–6.Google Scholar
A., Kanatas, N., Moraitis, G., Pantos, and P., Constantinou, “Wideband characterization of microcellular suburban mobile radio channels at 1.89 GHz,” Proc. IEEE Veh. Technol. Conf., pp. 1060–1064, 2002.Google Scholar
S., Kandeepan, S., Reisenfeld, T. C., Aysal, D., Lowe, and R., Piesiewicz, “Bayesian tracking in cooperative localization for cognitive radio networks,” Proc. 69th IEEE Vehicular Technology Conf. (VTC 2009-Spring), Barcelona, Spain, Apr. 26–29, 2009.Google Scholar
J., Karedal, N., Czink, A., Paier, F., Tufvesson, and A. F., Molisch, “Path loss modeling for vehicle-to-vehicle communications,” IEEE Trans. Veh. Technol., 60, no. 1, pp. 323–328, Jan. 2011.Google Scholar
P., Karlsson, C., Bergljung, E., Thomsen, and H., Borjeson, “Wideband measurement and analysis of penetration loss in the 5 GHz band,” Proc. IEEE Veh. Technol. Conf., pp. 2323–2328, 1999.Google Scholar
A., Kashyap, “Comments on the “On the optimality of the likelihood-ratio test for local sensor decision rules in the presence of nonideal channels”,” IEEE Trans. Inf. Theory, 52, no. 3, 1274–1275, Mar. 2006.Google Scholar
A.-K., Katta and J., Sethuraman, “A note on bandits with a twist,” SIAM J. Discrete Math., 18, no. 1, 110–113, 2004.Google Scholar
R., Kattenbach, “Statistical modeling of small-scale fading in directional radio channels,” IEEE J. Sel. Areas Commun., 20, no. 3, 584–592, Apr. 2002.Google Scholar
S. M., Kay, Fundamentals of Statistical Signal Processing: Detection Theory, Prentice-Hall PTR, 1998.Google Scholar
J. R., Kelly, E., Ebrahimi, P. S., Hall, P., Gardner, and F., Ghanem, “Combined wideband and narrowband antennas for cognitive radio applications,” IET Seminar on Cognitive Radio and Software Defined Radios: Technologies and Techniques, pp. 1–4, Sept. 2008.Google Scholar
J. F., Kepler, T. P., Krauss, and S., Mukthavaram, “Delay spread measurements on a wideband MIMO channel at 3.7 GHz,” Proc. IEEE Veh. Technol. Conf., pp. 2498–2502, 2002.Google Scholar
H., Kim and K. G., Shin, “Efficient discovery of spectrum opportunities with MAC-layer sensing in cognitive radio networks,” IEEE Trans. Mobile Comput., 7, no. 5, 533–545, May 2008.Google Scholar
S.-J., Kim and G. B., Giannakis, “Rate-optimal and reduced-complexity sequential sensing algorithms for cognitive OFDM radios,” EURASIP J. Adv. Signal Process. – Special Issue on Dynamic Spectrum Access for Wireless Networking, 2009, Article ID 421540, 2009.Google Scholar
S., Kim, H., Jeon, and J., Ma, “Robust localization with unknown transmission power for cognitive radio,” Proc. IEEE Military Communications Conf. (MILCOM 2007), Orlando, FL, Oct. 29–31, 2007.Google Scholar
S.-J., Kim and G. B., Giannakis, “Sequential and cooperative sensing for multi-channel cognitive radios,” IEEE Trans. Signal Process., 58, no. 8, 4239–4253, Aug. 2010.Google Scholar
J., Kivinen, X., Zhao, and P., Vainikainen, “Empirical characterization of wideband indoor radio channel at 5.3 GHz,” IEEE Trans. Antennas Propag., 49, no. 8, 1192–1203, Aug. 2001.Google Scholar
F., Kocak, H., Celebi, S., Gezici, K. A., Qarake, H., Arslan, and H. V., Poor, “Time delay estimation in dispersed spectrum cognitive radio systems,” EURASIP J. Adv. Signal Process. – Special Issue on Advanced Signal Processing for Cognitive Radio Networks, 2010, Article ID 675959, 10 pages, 2010.Google Scholar
R., Koetter, M., Effros, and M., Médard, “On a theory of network equivalence,” Proc. of the IEEE Information Theory Workshop (ITW), Volos, Greece, June 10–12 2009. arxiv.org/abs/1007–1033Google Scholar
J. R., Kok and N., Vlassis, “Collaborative multiagent reinforcement learning by payoff propagation,” J. Mach. Learn. Res., 7, 1789–1828, Dec. 2006.Google Scholar
M., Komulainen, M., Berg, H., Jantunen, E. T., Salonen, and C., Free, “A frequency tuning method for a planar inverted-F antenna,” IEEE Trans. Antennas and Propag., 56, no. 4, 944–950, Apr. 2008.Google Scholar
V. I., Kostylev, “Energy detection of a signal with random amplitude,” in Proc. IEEE Int. Conf. Commun. (ICC 2002), 3, 1606–1610, Apr. 28–May 2, 2002.Google Scholar
S., Kozono and A., Taguchi, “Mobile propagation loss and delay spread characteristics with a low base station antenna on an urban road,” IEEE Trans. Veh. Technol., 42, no. 1, 103–109, Feb. 1993.Google Scholar
G., Kramer, I., Marić, and R. D., Yates, “Cooperative communications,” NOW J. Found. Trends Netw., 1, no. 3–4, 271–425, 2006.Google Scholar
G., Kramer and S., Savari, “Capacity bounds for relay networks,” Proc. of the UCSD Workshop on Information Theory and Applications, La Jolla, CA, Feb. 6–10, 2006.Google Scholar
G., Kramer and S., Savari, “Edge-cut bounds on network coding rates,” J. Netw. Syst. Management, 14, no. 1, 49–67, Mar. 2006.Google Scholar
M. G., Krein and A. A., Nudel'man, The Markov Moment Problem and Extremal Problems. American Mathematical Society, 1977.Google Scholar
A., Kuchar, J. P., Rossi, and E., Bonek, “Directional macro-cell channel characterization from urban measurements,” IEEE Trans. Antennas Propag., 48, no. 2, 137–146, Feb. 2000.Google Scholar
N., Kundargi and A., Tewfik, “A performance study of novel sequential energy detection methods for spectrum sensing,” Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, TX, Mar. 14–19, 2010.Google Scholar
H., Kushwaha, Y., Xing, R., Chandramouli, and H., Heffes, “Reliable multimedia transmission over cognitive radio networks using fountain codes,” Proc. IEEE, 96, no. 1, 155–165, Jan. 2008.Google Scholar
H., Kushwaha, Y., Xing, R., Chandramouli, and K. P., Subbalakshmi, “Erasure tolerant coding for cognitive radios,” in Q. H., Mahmoud (ed.), Cognitive Networks – Towards Self-Aware Networks. J. Wiley & Sons, 2007.Google Scholar
H., Kushwaha, R., Chandramouli, and K. P., Subbalakshmi, “Cognitive networks: towards self-aware networks,” in Q. H., Mahmoud (ed.), Cognitive Networks – Towards Self-Aware Networks. J. Wiley & Sons, 2007.Google Scholar
U., Ladebusch and C., Liss, “Terrestrial DVB (DVB-T): a broadcast technology for stationary portable and mobile use,” Proc. IEEE, 94, no. 1, pp. 183–193, Jan. 2006.Google Scholar
L., Lai, H. El, Gamal, H., Jiang, and H. V., Poor, “Cognitive medium access: Exploration, exploitation, and competition,” IEEE Trans. Mobile Comput., 10, no. 2, 239–253, Feb. 2011.Google Scholar
L., Lai, Y., Fan, and H. V., Poor, “Quickest detection in cognitive radio: A sequential change detection framework,” Proc. IEEE Global Communications Conf. (GLOBECOM 2008), New Orleans, LA, Nov. 30–Dec. 4, 2008.Google Scholar
L., Lai, H., Jiang, and H. V., Poor, “Medium access in cognitive radio networks: A competitive multi-armed bandit framework,” Proc. 42nd Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Oct. 26–29, 2008, pp. 98–102.Google Scholar
T. L., Lai, “Asymptotic optimality of invariant sequential probability ratio tests,” Ann. Stat., 9, no. 2, 318–333, 1981.Google Scholar
T. L., Lai, “Nearly optimal sequential tests of composite hypotheses,” Ann. Stat., 16, no. 2, 856–886, 1988.Google Scholar
T. L., Lai, “On optimal stopping problems in sequential hypothesis testing,” Statist. Sinica, 7, 33–51, 1997.Google Scholar
T. L., Lai, “Sequential analysis: some classical problems and new challenges,” Statist. Sinica, 11, no. 2, 303–408, Apr. 2001.Google Scholar
T. L., Lai and H., Robbins, “Asymptotically efficient adaptive allocation rules,” Adv. Appl. Math., 6, no. 1, 4–22, Mar. 1985.Google Scholar
T. L., Lai and H., Xing, “Sequential change-point detection when the pre- and postchange parameters are unknown,” Technical Report no. 2009-5, Department of Statistics, Stanford University, Stanford, CA, Apr. 2009.Google Scholar
T. L., Lai and L., Zhang, “A modification of Schwarz's sequential likelihood ratio tests in multivariate sequential analysis,” Sequential Anal.: Design Methods Appl., 13, no. 2, 79–96, 1994.Google Scholar
J., Langford and T., Zhang, “The epoch-greedy algorithm for contextual multi-armed bandits,” in J.C., Platt, D., Koller, Y., Singer, and S., Roweis (eds.), Advances in Neural Information Processing Systems 20, pp. 817–824, MIT Press, 2008.Google Scholar
M., Larsson, “Spatio-temporal channel measurements at 1800 MHz for adaptive antennas,” Proc. IEEE Veh. Technol. Conf., pp. 376–380, 1999.Google Scholar
P., Laspougeas, P., Pajusco, and J. C., Bic, “Radio propagation in urban small cells environment at 2 GHz: experimental spatio-temporal characterization and spatial wideband channel model,” Proc. IEEE Veh. Technol. Conf., pp. 885–892, 2000.Google Scholar
G. S., Lauer and N. R., Sandell Jr., “Distributed detection of known signal in correlated noise,” Report ALPHATECH, Burlington, MA, Mar. 1982.Google Scholar
J., Laurila, K., Kalliola, M., Toeltsch, K., Hugl, P., Vainikainen, and E., Bonek, “Wideband 3D characterization of mobile radio channels in urban environment,” IEEE Trans. Antennas Propag., 50, no. 2, 233–243, Feb. 2002.Google Scholar
W.-Y., Lee and I. F., Akyildiz, “Optimal spectrum sensing framework for cognitive radio networks,” IEEE Trans. Wireless Commun., 7, no. 10, 3845–3857, Oct. 2008.Google Scholar
Z., Lei and F., Chin, “OFDM signal sensing for cognitive radios,” 19th International Symp. on Personal, Indoor, and Mobile Radio Communications (PIMRC'08), Cannes, France, Sep. 15–18, 2008.Google Scholar
K. B., Letaief and W., Zhang, “Cooperative communications for cognitive radio networks,” Proc. IEEE, 97, no. 5, 878–893, May 2009.Google Scholar
K., Leyton-Brown and Y., Shoham, Essentials of Game Theory: A Concise Multidisciplinary Introduction, Morgan & Claypool, 2008.Google Scholar
H., Li, “Restless watchdog: selective quickest spectrum sensing in multichannel cognitive radio systems,” EURASIP J. Adv. Signal Process. – Special Issue on Dynamic Spectrum Access for Wireless Networking, 2009, Article ID 417457, Aug. 2009.Google Scholar
H., Li, “Learning the spectrum via collaborative filtering in cognitive radio networks,” Proc. IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2010), Singapore, Apr. 6–9, 2010.
H., Li, “Multiagent Q-learning for Aloha-like spectrum access in cognitive radio systems,” EURASIP J. Wireless Commun. Netw., 2010, Article ID 876216, 2010.Google Scholar
H., Li, H., Dai, and C., Li, “Collaborative quickest spectrum sensing via random broadcast in cognitive radio systems,” IEEE Trans. Wireless Commun., 9, no. 7, 2338–2348, July 2010.Google Scholar
H., Li, C., Li, and H., Dai, “Collaborative quickest detection in adhoc networks with delay constraint – part I: Two-node network,” Proc. Conf. Information Sciences and Systems (CISS 2008), Princeton, NJ, Mar. 19–21, 2008, pp. 594–599.Google Scholar
H., Li, C., Li, and H., Dai, “Collaborative quickest detection in adhoc networks with delay constraint – Part II: Multi-node network,” Proc. Conf. Information Sciences and Systems (CISS 2008), Princeton, NJ, Mar. 19–21, 2008, pp. 600–605.Google Scholar
T., Li, N., Mandayam, and A., Reznik, “A framework for resource allocation in a cognitive digital home,” 2010 IEEE Global Telecommunications Conference, Dec. 2010, pp. 1–5.Google Scholar
T., Li, N., Mandayam, and A., Reznik, “Distributed algorithms for joint channel and RAT allocation in a cognitive digital home,” International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), May 2011, pp. 213–219.Google Scholar
Z., Li, L., Liu, and C., Zhou, “Fast detection method in cooperative cognitive radio networks,” Int. J. Digit. Multimedia Broadcast., 2010, Article ID 160462, 2010.Google Scholar
Y., Liang, A., Somekh-Baruch, V., Poor, S., Shamai (Shitz), and S., Verd,ú, “Cognitive interference channels with and without secrecy,” IEEE Trans. Inf. Theory, 55, no. 2, 604–619, Feb. 2009.Google Scholar
Y.-C., Liang, Y., Zeng, E., Peh, and A. T., Hoang, “Sensing-throughput tradeoff for cognitive radio networks,” IEEE Trans. Wireless Commun., 7, no. 4, 1326–1337, Apr. 2008.Google Scholar
M., Lienard and P., Degauque, “Natural wave propagation in mine environments,” IEEE Trans. Antennas Propag., 48, no. 9, 1326–1339, Sep. 2000.Google Scholar
M. L., Littman, “Markov games as a framework for multi-agent reinforcement learning,” Proc. 11th Int. Conf. Machine Learning (ICML 1994), San Francisco, CA, 1994, pp. 157–163.Google Scholar
H., Liu, K., Liu, and Q., Zhao, “Learning in a changing world: non-Bayesian restless multi-armed bandit,” Technical Report TR-10-03, University of California, Davis, CA, 2010.Google Scholar
K., Liu and Q., Zhao, “Indexability of restless bandit problems and optimality of Whittle index for dynamic multichannel access,” IEEE Trans. Inf. Theory, 56, no. 11, 5547–5567, Nov. 2010.Google Scholar
K., Liu and Q., Zhao, “Distributed learning in multi-armed bandit with multiple players,” IEEE Trans. Signal Process., 58, no. 11, 5667–5681, Nov. 2010.Google Scholar
K., Liu, Q., Zhao, and B., Krishnamachari, “Dynamic multichannel access with imperfect channel state detection,” IEEE Trans. Signal Process., 58, no. 5, 2795–2808, May 2010.Google Scholar
K. J. R., Liu and B., Wang, Cognitive Radio Networking and Security, Cambridge University Press, 2011.Google Scholar
N., Liu, I., Marić, A., Goldsmith, and S., Shamai (Shitz), “Bounds and capacity results for the cognitive Z-interference channel,” Proc. of the IEEE International Symposium on Information Theory, Seoul, Korea, June 28–July 3, 2009.
G., Lorden, “2-SPRT's and the modified Kiefer-Weiss problem of minimizing an expected sample size,” Ann. Stat., 4, no. 2, 281–291, 1976.Google Scholar
Y., Lu, H., He, J., Wang, and S., Li, “Energy-efficient dynamic spectrum access using no-regret learning,” Proc. 7th Int. Conf. Information, Communications, and Signal Processing (ICICS 2009), Macau, China, Dec. 8–10, 2009.Google Scholar
J., Lundén, Spectrum Sensing for Cognitive Radio and Radar Systems, D.Sc. Dissertation, Helsinki University of Technology, Espoo, Finland, 2009.Google Scholar
J., Lundén, S. A., Kassam, and V., Koivunen, “Robust nonparametric cyclic correlation based spectrum sensing for cognitive radio,” IEEE Trans. Signal Process., 58, no. 1, 38–52, Jan. 2010.Google Scholar
J., Lundén, V., Koivunen, A., Huttunen, and H. V., Poor, “Collaborative cyclostationary spectrum sensing for cognitive radio systems,” IEEE Trans. Signal Process., 57, no. 11, 4182–4195, Nov. 2009.Google Scholar
J., Lundén, V., Koivunen, S. R., Kulkarni, and H. V., Poor, “Reinforcement learning based distributed multiagent sensing policy for cognitive radio networks,” Proc. IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2011), Aachen, Germany, May 3–6, 2011.Google Scholar
J., Lundén, V., Koivunen, S. R., Kulkarni, and H. V., Poor, “Exploiting spatial diversity in multiagent reinforcement learning based spectrum sensing,” Proc. 4th IEEE Int. Workshop Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP 2011), San Juan, Puerto Rico, Dec. 13–16, 2011.Google Scholar
L., Luo and S., Roy, “Analysis of search schemes in cognitive radio,” Proc. 2nd IEEE Workshop Networking Technologies for Software Defined Radio Networks, San Diego, CA, USA, June 18–21, 2007, pp. 17–24.Google Scholar
J., Ma, G. Y., Li, and B. H., Juang, “Signal processing in cognitive radio,” Proc. IEEE, 97, no. 5, pp. 805–823, May 2009.Google Scholar
J., Ma, G., Zhao, and Y., Li, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,” IEEE Trans. Wireless Commun., 7, no. 11, 4502–4507, Nov. 2008.Google Scholar
Z., Ma, W., Chen, K. B., Letaief, and Z., Cao, “A semi range-based iterative localization algorithm for cognitive radio networks,” IEEE Trans. Veh. Technol., 59, no. 2, 704–717, Feb. 2010.Google Scholar
J. T., MacDonald and D. R., Ucci, “Interference temperature limits of IEEE 802.11 protocol radio channels,” IEEE Electro/Information Technology Conference (EIT'07), Chicago, IL, May 17–20, 2007.Google Scholar
A. B., MacKenzie and L. A., DaSilva, Game Theory for Wireless Engineers, Morgan & Claypool, 2006.Google Scholar
J., MacLellan, S., Lam, and X., Lee, “Residential indoor RF channel characterization,” Proc. IEEE Veh. Technol. Conf., pp. 210–213, 1993.Google Scholar
M. A. Maddah, Ali, S. A., Motahari, and A. K., Khandani, “Communication over MIMO X channels: interference alignment, decomposition, and performance analysis,” IEEE Trans. Inf. Theory, 54, no. 8, 3457–3470, Aug. 2008.Google Scholar
A., Mahajan and D., Teneketzis, “Multi-armed bandit problems,” in: A. O., Hero III, D., Castañón, D., Cochran, and K., Kastella (eds.), Foundations and Applications of Sensor Management, pp. 121–151, Springer, 2008.Google Scholar
I., Marić, A., Goldsmith, G., Kramer, and S., Shamai (Shitz), “On the capacity of interference channels with a partially-cognitive transmitter,” Proc. of the IEEE International Symposium on Information Theory, Nice, France, June 24–29, 2007.Google Scholar
I., Marić, R. D., Yates, and G., Kramer, “Strong interference channel with unidirectional cooperation,” Proc. of the UCSD Workshop on Information Theory and Applications, La Jolla, CA, Feb. 6–10, 2006.Google Scholar
I., Marić, R. D., Yates, and G., Kramer, “Capacity of interference channels with partial transmitter cooperation,” IEEE Trans. Inf. Theory, 53, no. 10, 3536–3548, Oct. 2007.Google Scholar
P., Marshall, Quantitative Analysis of Cognitive Radio and Network Performance. Artech House, 2010.Google Scholar
U., Martin, “Spatio-temporal radio channel characteristics in urban macrocells,” IEE Proc. Radar, Sonar and Navigation, 145, 42–49, Feb. 1998.Google Scholar
K., Marton, “A coding theorem for the discrete memoryless broadcast channel,” IEEE Trans. Inf. Theory, 25, no. 3, 306–311, May 1979.Google Scholar
D., Matolak and J., Frolik, “Worse-than-Rayleigh fading: experimental results and theoretical models,” IEEE Commun. Mag., 49, issue 4, 140–146, 2011.Google Scholar
J. W., Matthews, “Sharp error bounds for intersymbol interference,” IEEE Trans. Inf. Theory, IT-19, no. 4, 440–447, July 1973.Google Scholar
M., McHenry, E., Livsics, T., Nguyen, and N., Majumdar, “Xg dynamic spectrum access field test results,” IEEE Commun. Magazine, 45, no. 6, 51–57, June 2007.Google Scholar
M., McHenry, D., McCloskey, and G., Lane-Roberts, “New York City Spectrum Occupancy Measurements Sep. 2004,” Tech. Rep., Dec. 2004.Google Scholar
C. F., Mecklenbräauker, A. F., Molisch, J., Karedal, et al., “Vehicle channel characterization and its implications for wireless system design and performance,” Proc. IEEE, 99, no. 7, 1189–1212, July 2011.Google Scholar
J., Medbo, H., Hallenberg, and J. E., Berg, “Propagation characteristics at 5 GHz in typical radio-LAN scenarios,” Proc. IEEE Veh. Technol. Conf., pp. 185–189, 1999.Google Scholar
J., Medbo and P., Schramm, “Channel models for HIPERLAN/2,” ETSI/BRAN document no. 3ERI085B.
Y., Mei, “Sequential change-point detection when unknown parameters are present in the prechange distribution,” Ann. Stat., 34, no. 1, 92–122, 2006.Google Scholar
Y., Mei, “Asymptotic optimality theory for decentralized sequential hypothesis testing in sensor networks,” IEEE Trans. Inf. Theory, 54, no. 5, 2072–2089, 2008.Google Scholar
Y., Mei, “Is average run length to false alarm always an informative criterion?,” Sequential Anal., 27, no. 4, 354–376, Oct. 2008.Google Scholar
Z., Miljanic, I., Seskar, K., Le, and D., Raychaudhuri, “The WINLAB network centric cognitive radio hardware platform – WiNC2R,” Mobile Networks and Applications, 13, no. 5, October 2008.Google Scholar
G., Minden, J., Evans, L., Searl, et al., “Cognitive radios for dynamic spectrum access – an agile radio for wireless innovation,” IEEE Commun. Magazine, 45, no. 5, 113–121, May 2007.Google Scholar
J., Mitola III, Cognitive Radio: Model-Based Competence for Software Radio, Licentiate Thesis, The Royal Institute of Technology. Stockholm, Sweden, Aug. 1999.Google Scholar
J., Mitola and G. Q., Maguire, “Cognitive radio: making software radios more personal,” IEEE Pers. Commun., 6, no. 4, 13–18, Aug. 1999.Google Scholar
U., Mitra and H. V., Poor, “Activity detection in a multi user environment,” Wireless Pers. Commun. – Special Issue on Signal Separation and Cancellation for Personal, Indoor and Mobile Radio Communications, 3, Nos. 1–2, 149–174, Jan. 1996.Google Scholar
W., Mohr, “Wideband propagation measurements of mobile radio channels in mountainous areas in the 1800 MHz frequency range,” Proc. IEEE Veh. Technol. Conf., pp. 49–52, 1993.Google Scholar
A. F., Molisch, Wireless Communications (2nd edn.). J. Wiley & Sons, 2011.Google Scholar
A. F., Molisch, H., Asplund, R., Heddergott, M., Steinbauer, and T., Zwick, “The COST259 directional channel model part I: overview and methodology,” IEEE Trans. Wireless Commun., 5, no. 12, 3421–3433, Dec. 2006.Google Scholar
A. F., Molisch, K., Balakrishnan, C. C., Chong, et al., “A comprehensive model for ultrawideband propagation channels,” IEEE Trans. Antennas Propag., 54, no. 11, 3151–3166, Nov. 2006.Google Scholar
A. F., Molisch, J. R., Foerster, and M., Pendergrass, “Channel models for ultra-wideband personal area networks,” IEEE Wireless Commun. Mag., 10, no. 6, 14–21, Dec. 2003.Google Scholar
A. F., Molisch, L. J., Greenstein, and M., Shafi, “Propagation issues for cognitive radio,” Proc. IEEE, 97, no. 5, 787–804, May 2009.Google Scholar
A. F., Molisch and H., Hofstetter, “The COST 273 MIMO channel model,” in L., Correia (ed.), Mobile Broadband Multimedia Networks, Academic Press, 2006.Google Scholar
A. F., Molisch and F., Tufvesson, “Multipath propagation models for broadband wireless systems,” in M., Ibnkahla (ed.), Handbook of Signal Processing for Wireless Commmunications, CRC Press, 2004.Google Scholar
A. F., Molisch, F., Tufvesson, J., Karedal, and C., Mecklenbraueker, “A survey on vehicle-to-vehicle propagation channels,” IEEE Wireless Comm. 16, issue 6, 12–22, 2009.Google Scholar
A. S., Motahari and A. K., Khandani, “Capacity bounds for the Gaussian interference channel,” Proc. of the IEEE International Symposium on Information Theory, Toronto, Canada, July 6–11, 2008.Google Scholar
A., Motamedi and A., Bahai, “Optimal channel selection for spectrum-agile low-power wireless packet switched networks in unlicensed band,” EURASIP J. Wireless Commun. Netw., 2008, Article ID 896420, 2008.Google Scholar
G. V., Moustakides, “Optimal stopping times for detecting changes in distributions,” Ann. Stat., 14, no. 4, 1379–1387, 1986.Google Scholar
G. V., Moustakides, A. S., Polunchenko, and A. G., Tartakovsky, “A numerical approach to performance analysis of quickest change-point detection procedures,” Statist. Sinica, 21, no. 2, 571–596, 2011.Google Scholar
L., Musavian and S., Aissa, “Capacity and power allocation for spectrum-sharing communications in fading channels,” IEEE Trans. Wireless Commun., 8, no. 1, 148–156, Jan. 2009.Google Scholar
M., Nakagami, “The M-distribution: a general formula of intensity of rapid fading,” in W. C., Hoffman (ed.), Statistical Methods in Radio Wave Propagation. Pergamon Press, 1960.Google Scholar
National Telecommunications and Information Administration (NTIA), “FCC frequency allocation chart,” Tech. Rep., 2003. www.ntia.doc.gov/files/ ntia/publications/2003-allochrt.pdf.
B., Nazer and M., Gastpar, “Computation over multiple-access channels,” IEEE Trans. Inf. Theory, 53, no. 10, Oct. 2007.Google Scholar
B., Nazer, M., Gastpar, S., Jafar, and S., Vishwanath, “Ergodic interference alignment,” Proc. IEEE International Symposium on Information Theory, Seoul, S. Korea, June 28–July 3, 2009, pp. 1769–1773.Google Scholar
T., Newman, S., Hasan, D., Depoy, T., Bose, and J., Reed, “Designing and deploying a building-wide cognitive radio network testbed,” IEEE Commun. Magazine, 48, no. 9, pp. 106–112, Sept. 2010.Google Scholar
S., Nikolaou, R., Bairavasubramanian, C., Lugo Jr., et al., “Pattern and frequency reconfigurable annular slot antenna using pin diodes,” IEEE Trans. Antennas and Propag., 54, no. 2, 439–448, Feb. 2006.Google Scholar
J., Niño-Mora, “Restless bandits, partial conservation laws and indexability,” Adv. Appl. Prob., 33, no. 1, 76–98, 2001.Google Scholar
J., Niño-Mora, “Dynamic priority allocation via restless bandit marginal productivity indices,” TOP, 15, no. 2, 161–198, 2007.Google Scholar
J., Niño-Mora, “A (2/3)n3 fast-pivoting algorithm for the Gittins index and optimal stopping of a Markov chain,” INFORMS J. Comput., 19, no. 4, 596–606, 2007.Google Scholar
J., Niño-Mora, “An index policy for dynamic fading-channel allocation to heterogeneous mobile users with partial observations,” Proc. 4th Euro-NGI Conf. Next Generation Internet Networks, Kraków, Poland, Apr. 28–30, 2008.Google Scholar
J., Niño-Mora, “A restless marginal productivity index for opportunistic spectrum access with sensing errors,” in R., Núñez-Queija and J., Resing (eds.), Network Control and Optimization, 3rd Euro-NF Conf., NET-COOP 2009 Eindhoven, The Netherlands, Nov. 23-25, 2009 Proceedings, Lecture Notes in Computer Science, vol. 5894, Springer, 2009.Google Scholar
J., Niño-Mora and S. S., Villar, “Multitarget tracking via restless bandit marginal productivity indices and Kalman filter in discrete time,” Proc. Joint 48th IEEE Conf. Decision and Control and 28th Chinese Control Conf., Shanghai, China, Dec. 16–18, 2009.
Office of Engineering and Technology in FCC, “Understanding the FCC regulations for low-power, non-licensed transmitters,” Tech. Rep., 1993. transition. fcc.gov/Bureaus/Engineering_Technology/Documents/bulletins/oet63/oet63rev.pdf.
D.-C., Oh, H.-C., Lee, and Y.-H., Lee, “Linear hard decision combining for cooperative spectrum sensing in cognitive radio systems,” Proc. 72nd IEEE Vehicular Technology Conf. (VTC 2010-Fall), Ottawa, ON, Canada, Sep. 6–9, 2010, pp. 1–5.Google Scholar
J., Oksanen, V., Koivunen, J., Lundén, and A., Huttunen, “Diversity-based spectrum sensing policy for detecting primary signals over multiple frequency bands,” Proc. 35th IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2010), Dallas, TX, Mar. 14–19, 2010.Google Scholar
J., Oksanen, J., Lundén, and V., Koivunen, “Characterization of spatial diversity in cooperative spectrum sensing,” Proc. 4th Int. Symp. Communications, Control, and Signal Processing (ISCCSP 2010), Limassol, Cyprus, Mar. 3–5, 2010.Google Scholar
J., Oksanen, J., Lundén, and V., Koivunen, “Reinforcement learning-based multiband sensing policy for cognitive radios,” Proc. 2nd Int. Workshop Cognitive Information Processing (CIP 2010), Elba Island, Tuscany, Italy, June 14–16, 2010.Google Scholar
J., Oksanen, J., Lundén, and V., Koivunen, “Reinforcement learning method for energy efficient cooperative multiband spectrum sensing,” Proc. IEEE Int. Workshop Machine Learning for Signal Processing (MLSP 2010), Kittiläa, Finland, Aug. 29–Sep. 1, 2010.Google Scholar
J., Oksanen, J., Lundén, and V., Koivunen, “Reinforcement learning based sensing policy optimization for energy efficient cognitive radio networks,” Neurocomputing – Special Issue on Machine Learning for Signal Processing 2010, 80, 102–110, Mar. 2012.Google Scholar
Y., Okumura, E., Ohmori, T., Kawano, and K., Fukuda, “Field strength and its variability in UHF and VHF land-mobile radio service,” Rev. Elec. Commun. Lab., 16, no. 9, 1968.Google Scholar
F. W. J., Olvert, D. W., Lozier, R. F., Boisvert, and C. W., Clark, NIST Handbook of Mathematical Functions. NIST and Cambridge University Press, 2010.Google Scholar
I., Oppermann, J., Talvitie, and D., Hunter, “Wide-band wireless local loop channel for urban and sub-urban environments at 2 GHz,” Proc. IEEE Int. Conf. Commun., pp. 61–65, 1997.Google Scholar
“ORBIT: open-access research testbed for next-generation wireless networks,” www.orbit-lab.org/.
T., Oskiper and H. V., Poor, “Online activity detection in a multiuser environment using the matrix CUSUM algorithm,” IEEE Trans. Inf. Theory, 46, no. 2, 477–493, Feb. 2002.Google Scholar
A., Ozgur and O., Leveque, “Throughput–delay tradeoff for hierarchical cooperation in ad hoc wireless networks,” IEEE Trans. Inf. Theory, 56, no. 3, 1369–1377, Mar. 2010.Google Scholar
A., Ozgur, O., Leveque, and D. N. C., Tse. “Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks,” IEEE Trans. Inf. Theory, 53, no. 10, 3549–3572, Oct. 2007.Google Scholar
A., Ozgur and D. N. C., Tse, “Achieving linear scaling with interference alignment,” Proc. of the IEEE International Symposium on Information Theory, Seoul, Korea, June 28–July 3, 2009, pp. 1754–1758.Google Scholar
E. S., Page, “Continuous inspection schemes,” Biometrika, 41, no. 1–2, 100–115, 1954.Google Scholar
P., Pajusco, “Experimental characterization of DOA at the base station in rural and urban area,” Proc. IEEE Veh. Technol. Conf., pp. 993–997, 1998.Google Scholar
H., Pan, J. T., Bernhard, and V. K., Nair, “Reconfigurable single-armed square spiral microstrip antenna design,” IEEE International Workshop on Antenna Technology Small Antennas and Novel Metamaterials, 6–8, 2006, pp. 180–183.Google Scholar
H. K., Pan, J., Tsai, J., Martinez, S., Golden, V. K., Nair, and J. T., Bernhard, “Reconfigurable antenna implementation in multi-radio platform,” IEEE Antennas and Propagation Society International Symposium, 2008, July 2008, pp. 1–4.Google Scholar
D. G., Pandelis and D., Teneketzis, “On the optimality of the Gittins index rule for multi-armed bandits with multiple plays,” Math. Meth. Oper. Res., 50, no. 3, 449–461, 1999.Google Scholar
S., Pandey, D., Chakrabarti, and D., Agarwal, “Multi-armed bandit problems with dependent arms,” Proc. 24th Int. Conf. Machine Learning (ICML 2007), Corvallis, OR, USA, June 20–24, 2007.Google Scholar
J.-S., Pang, G., Scutari, and D. P., Palomar, “Design of cognitive radio systems under temperature-interference constraints: a variational inequality approach,” IEEE Trans. Signal Process., 58, no. 6, 3251–3271, June 2010.Google Scholar
K. I., Pedersen, P. E., Mogensen, and B. H., Fleury, “Power azimuth spectrum in outdoor environments,” Electronics Letters, 33, 1583–1584, Aug. 1997.Google Scholar
K. I., Pedersen, P. E., Mogensen, B. H., Fleury, F., Frederiksen, K., Olesen, and S. L., Larsen, “Analysis of time, azimuth, and doppler dispersion in outdoor radio channels,” Proc. ACTS Mobile Communications Summit, Aalborg, Denmark, pp. 308–313, 1997.Google Scholar
E. C. Y., Peh, Y.-C., Liang, Y. L., Guan, and Y., Zeng, “Optimization of cooperative sensing in cognitive radio networks: a sensing-throughput tradeoff view,” IEEE Trans. Veh. Technol., 58, no. 9, 5294–5299, Nov. 2009.Google Scholar
Y., Pei, A. T., Hoang, and Y.-C., Liang, “Sensing-throughput tradeoff in cognitive radio networks: how frequently should spectrum sensing be carried out?,” IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), Athens, Greece, Sep. 3–7, 2007.Google Scholar
B., Peleg and P., Sudhölter, Introduction to the Theory of Cooperative Games (2nd edn.). Springer-Verlag, 2007.Google Scholar
Q., Peng, K., Zeng, J., Wang, and S., Li, “A distributed spectrum sensing scheme based on credibility and evidence theory in cognitive radio context,” Proc. 17th IEEE Int. Symp. Personal, Indoor, and Mobile Radio Communications (PIMRC 2006), Helsinki, Finland, Sep. 11–14, 2006, pp. 1–5.Google Scholar
C. E., Perkins, Ad Hoc Networking, Addison-Wesley, 2001.Google Scholar
M., Pollak, “A robust changepoint detection method,” Sequential Analysis, 29, no. 2, 146–161, Apr. 2010.Google Scholar
M., Pollak and A. G., Tartakovsky, “Optimality properties of the Shiryaev-Roberts procedure,” Statist. Sinica, 19, 1729–1739, 2009.Google Scholar
A. S., Polunchenko and A. G., Tartakovsky, “On optimality of the Shiryaev-Roberts procedure for detecting a change in distribution,” Ann. Stat., 38, no. 6, 3445–3457, 2010.Google Scholar
H. V., Poor, An Introduction to Signal Detection and Estimation (2nd edn.). Springer-Verlag, 1994.Google Scholar
H. V., Poor and O., Hadjiliadis, Quickest Detection, Cambridge University Press, 2009.Google Scholar
C., Prehofer and C., Bettstetter, “Self-organization in communication networks: principles and design paradigms,” IEEE Commun. Magazine, 43, no. 7, 78–85, July 2005.Google Scholar
“Quality of service and mobility driven cognitive radio systems,” www.ictqosmos.eu/home.html.
Z., Quan, S., Cui, H. V., Poor, and A. H., Sayed, “Collaborative wideband sensing for cognitive radios,” IEEE Signal Process. Mag. – Special Issue on Signal Processing for Cognitive Radio Networks, 25, no. 6, 60–73, Nov. 2008.Google Scholar
Z., Quan, S., Cui, and A. H., Sayed, “Optimal linear cooperation for spectrum sensing in cognitive radio networks,” IEEE J. Sel. Topics Signal Process., 2, no. 4, 2431–2436, Apr. 2010.Google Scholar
Z., Quan, S., Cui, A. H., Sayed, and H. V., Poor, “Optimal multiband joint detection for spectrum sensing in cognitive radio networks,” IEEE Trans. Signal Process., 57, no. 3, 1128–1140, Mar. 2009.Google Scholar
C., Rago, P., Willett, and Y., Bar-Shalom, “Censoring sensors: a low-communication-rate scheme for distributed detection,” IEEE Trans. Aerosp. Electron. Syst., 32, no. 2, 554–568, Apr. 1996.Google Scholar
A., Rahman and P., Gburzynski, “Hidden problems with the hidden node problem,” 23rd Biennial Symposium on Communications, pp. 270–273, May 29–June 1, 2006.Google Scholar
J., Rajasekharan, J., Eriksson, and V., Koivunen, “Cooperative game-theoretic solutions to spectrum sharing in cognitive radios,” Proc. 44th Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Nov. 7–10, 2010.Google Scholar
R., Rajbanshi, Q., Chen, A. M., Wyglinski, G. J., Minden, and J. B., Evans, “Quantitative comparison of agile modulation techniques for cognitive radio transceivers,” IEEE Consumer Communications and Networking Conference, 2007, Jan. 2007, pp. 1144–1148.Google Scholar
R., Rajbanshi, A. M., Wyglinski, and G. J., Minden, “An efficient implementation of NCOFDM transceivers for cognitive radios,” International Conference on Cognitive Radio Oriented Wireless Networks and Communications, June 2006, pp. 1–5.Google Scholar
R., Rajbanshi, A. M., Wyglinski, and G. J., Minden, “Peak-to-average power ratio analysis for NC-OFDM transmissions,” IEEE Vehicular Technology Conference, Sept. 2007, pp. 1351–1355.Google Scholar
C., Raman, Scheduling and Relaying in Interference Limited Wireless Networks, Ph.D. Dissertation, Rutgers University, 2010.Google Scholar
C., Raman, R., Yates, and N., Mandayam, “Scheduling variable rate links via a spectrum server,” Proc. IEEE DySPAN, 2005, Baltimore, MD.Google Scholar
T. S., Rappaport, “Characterization of UHF multipath radio channels in factory buildings,” IEEE Trans. Antennas Propag., 37, no. 8, 1058–1069, Aug. 1989.Google Scholar
T. S., Rappaport, Wireless Communications: Principles and Practice (2nd edn.). Prentice Hall, 2001.Google Scholar
T. S., Rappaport, S. Y., Seidel, and R., Singh, “900-MHz multipath propagation measurements for US digital cellular radiotelephone,” IEEE Trans. Veh. Technol., 39, no. 2, 132–139, May 1990.Google Scholar
D., Raychaudhuri, N., Mandayam, J., Evans, B., Ewy, S., Seshan, and P., Steenkiste, “CogNet – an architectural foundation for experimental cognitive radio networks within the future internet,” Proc. MobiArch, 2006.Google Scholar
Recommendation ITU P 1546-3, “Method for point-to-area predictions for terrestrial services in the frequency range 30 MHz to 3000 MHz,” 2007.
“Rice University WARP,” warp.rice.edu/.
S., Rini, D., Tuninetti, and N., Devroye, “New inner and outer bounds for the memoryless cognitive interference channel and some capacity results,” IEEE Trans. Inf. Theory, 57, no. 7, 4087–4109, July 2011.Google Scholar
S. W., Roberts, “A comparison of some control chart procedures,” Technometrics, 8, no. 3, 411–430, Aug. 1966.Google Scholar
V., Rodoplu and T. H., Meng, “Bits-per-joule capacity of energy-limited wireless networks,” IEEE Trans. Wireless Commun., 6, no. 3, 857–865, Mar. 2007.Google Scholar
G. A., Rummery and M., Niranjan, “On-line Q-learning using connectionist systems,” Technical Report CUED/F-INFENG/TR 166, Cambridge University Engineering Department, Cambridge, UK, Sep. 1994.Google Scholar
W., Saad, Z., Han, T., Başar, M., Debbah, and A., Hjørungnes, “Coalition formation games for collaborative spectrum sensing,” IEEE Trans. Veh. Technol., 60, no. 1, 276–297, Jan. 2011.Google Scholar
W., Saad, Z., Han, M., Debbah, A., Hjørungnes, and T., Başar, “Coalitional game theory for communication networks: a tutorial,” IEEE Signal Process. Mag., 26, no. 5, 77–97, Sep. 2009.Google Scholar
J., Sachs, I., Marić, and A. J., Goldsmith, “Cognitive cellular systems within the TV spectrum,” Proc. of the IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Singapore, Apr. 6–9, 2010, pp. 1–12.Google Scholar
A., Sahai, R., Tandra, S. M., Mishra, and N., Hoven, “Fundamental design tradeoffs in cognitive radio systems,” Proc. 1st Int. Workshop Technol. Policy for Accessing Spectrum (TAPAS 2006), Boston, MA: Aug. 2–5, 2006.Google Scholar
A., Saleh and R. A., Valenzuela, “A statistical model for indoor multipath propagation,” IEEE J. Sel. Areas Commun., 5, no. 2, 128–137, Feb. 1987.Google Scholar
M., Sanna and M., Murroni, “Optimization of non-convex multiband cooperative sensing with genetic algorithms,” IEEE J. Sel. Topics Signal Process., 5, no. 1, 87–96, Feb. 2011.Google Scholar
S., Sardellitti, M., Giona, and S., Barbarossa, “Fast distributed average consensus algorithms based on advection-diffusion processes,” IEEE Trans. Signal Process., 58, no. 2, 826–842, Feb. 2010.Google Scholar
H., Sato, “Two user communication channels,” IEEE Trans. Inf. Theory, 23, no. 3, 295–304, May 1977.Google Scholar
H., Sato, “The capacity of the Gaussian interference channel under strong interference,” IEEE Trans. Inf. Theory, 27, no. 6, 786–788, Nov. 1981.Google Scholar
T., Schmidl and D., Cox, “Robust frequency and timing synchronization for OFDM,” IEEE Trans. Commun., 45, no. 12, 1613–1621, Dec. 1997.Google Scholar
M., Schwartz, W. R., Bennett, and S., Stein, Communication Systems and Techniques. McGraw-Hill, 1966.Google Scholar
G., Scutari and D. P., Palomar, “MIMO cognitive radio: a game theoretical approach,” IEEE Trans. Signal Process., 58, no. 2, 761–780, Feb. 2010.Google Scholar
S. Y., Seidel, T. S., Rappaport, S., Jain, M. L., Lord, and R., Singh, “Path loss, scattering and multipath delay statistics in four European cities for digital cellular and microcellular radiotelephone,” IEEE Trans. Veh. Technol., 40, no. 4, 721–730, Nov. 1991.Google Scholar
S., Sesia, I., Toufik, and M., Baker, Eds., LTE – The UMTS Long Term Evolution. J. Wiley & Sons, 2009.
M., Shafi, M., Zhang, A. L., Moustakas, P. J., Smith, A. F., Molisch, F., Tufvesson, and S. H., Simon, “Polarized MIMO channels in 3-D: models, measurements and mutual information,” IEEE J. Sel. Areas Commun., 24, no. 3, 514–527, Mar. 2006.Google Scholar
X., Shang, G., Kramer, and B., Chen, “A new outer bound and the noisy-interference sumrate capacity for Gaussian interference channels,” IEEE Trans. Inf. Theory, 55, no. 2, 689–699, Feb. 2009.Google Scholar
C. E., Shannon, “A mathematical theory of communication,” Bell Sys. Tech. Journal, pp. 379–423, 623–656, 1948.Google Scholar
C. E., Shannon, “Communications in the presence of noise,” Proc. IRE, 37, pp. 10–21, 1949.Google Scholar
C. E., Shannon, “Two-way communication channels,” Proc. Berkeley Symposium on Math, Statistics, and Probability, 1, 1961, 611–644.
C. E., Shannon and W., Weaver, The Mathematical Theory of Communication, University of Illinois Press, 1949.Google Scholar
,Shared Spectrum Company, “Comprehensive spectrum occupancy measurements over six different locations,” Aug. 2005. www.sharedspectrum.com/?section=nsf_ summary.
,Shared Spectrum Company, “General survey of radio frequency bands – 30 MHz to 3 GHz,” Tech. Rep., Sep. 2010.Google Scholar
F., Shayegh and M. R., Soleymani, “Rateless codes for cognitive radio in a virtual unlicensed spectrum,” Proc. IEEE Sarnoff Symposium, Princeton, NJ, May 2–4, 2011.Google Scholar
Y., Shei and Y. T., Su, “A sequential test based cooperative spectrum sensing scheme for cognitive radios,” Proc. 19th Int. Symp. Personal, Indoor, and Mobile Radio Communications (PIMRC 2008), Cannes, France, Sep. 15–18, 2008.Google Scholar
S., Shetty, M., Song, C., Xin, and E. K., Park, “A learning-based multiuser opportunistic spectrum access approach in unslotted primary networks,” Proc. IEEE Conf. Computer Communications (INFOCOM 2009), Rio de Janeiro, Brazil, Apr. 19–25, 2009.Google Scholar
A. N., Shiryaev, “On optimum methods in quickest detection problems,” Theory Probab. Appl., 8, no. 1, 22–46, Jan. 1963.Google Scholar
A. N., Shiryaev, “Quickest detection problems: fifty years later,” Sequential Anal., 29, no. 4, pp. 345–385, Oct. 2010.Google Scholar
Y., Shoham and K., Leyton-Brown, Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations, Cambridge University Press, 2009.Google Scholar
D., Siegmund, Sequential Analysis, Springer-Verlag, 1985.Google Scholar
M. K., Simon and M.-S., Alouini, Digital Communication over Fading Channels (2nd edn.). J. Wiley & Sons, 2005.Google Scholar
S. P., Singh, T., Jaakkola, M. L., Littman, and C., Szepesvári, “Convergence results for single-step on-policy reinforcement-learning algorithms,” Mach. Learn., 39, 287–308, 2000.Google Scholar
B., Sklar, “Rayleigh fading channels in mobile digital communication systems. I. Characterization,” IEEE Commun. Mag., 35, no. 9, 136–146, Sep. 1997.Google Scholar
A., Somekh-Baruch, S., Shamai (Shitz), and S., Verdú, “Cognitive interference channels with state information,” Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 6–11, 2008.Google Scholar
I. M., Sonin, “A generalized Gittins index for a Markov chain and its recursive calculation,” Technical Report, Department of Mathematics, University of North Carolina at Charlotte, Charlotte, NC, 2005.Google Scholar
E. S., Sousa, V. M., Jovanovic, and C., Daigneault, “Delay spread measurements for the digital cellular channel in Toronto,” IEEE Trans. Veh. Technol., 43, no. 4, 837–847, Nov. 1994.Google Scholar
“Spatial channel model for multiple input multiple output (MIMO) simulations (Rel. 7),” 3GPP TR 25.996 V7.0.0, 2007.
Q. H., Spencer, B. D., Jeffs, M. A., Jensen, and A. L., Swindlehurst, “Modeling the statistical time and angle of arrival characteristics of an indoor multipath channel,” IEEE J. Sel. Areas Commun., 18, 347–360, Mar. 2000.Google Scholar
S., Sridharan, A., Jafarian, S., Vishwanath, S. A., Jafar, and S., Shamai (Shitz), “A layered lattice coding scheme for a class of three user Gaussan interference channels,” Proc. Allerton Conference on Communication, Control and Computing, Monticello, IL, Sep. 24–26, 2008, pp. 531–538.Google Scholar
M., Steinbauer and A. F., Molisch (chapter eds.), “Directional channel models,” in L., Correia (ed.), Flexible Personalized Wireless Communications, J. Wiley & Sons, 2001.
M., Steinbauer, A. F., Molisch, and E., Bonek, “The double-directional radio channel,” IEEE Antennas Propag. Mag., 43, no. 4, 51–63, Aug. 2001.Google Scholar
G., Stüber, Principles of Mobile Communications. Kluwer, 1996, 2nd edition, 2001.Google Scholar
H. A., Suraweera, P. J., Smith, and M., Shafi, “Capacity limits and performance analysis of cognitive radio with imperfect channel knowledge,” IEEE Trans. Veh. Technol., 59, no. 4, 1811–1822, May 2010.Google Scholar
R. S., Sutton and A. G., Barto, Reinforcement Learning: An Introduction, MIT Press, 1998.Google Scholar
C., Szepesvári, Algorithms for Reinforcement Learning, Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool, 2010.Google Scholar
S. S., Szyszkowicz, H., Yanikomeroglu, and J. S., Thompson, “On the feasibility of wireless shadowing correlation models,” IEEE Trans. Veh. Technol., 59, no. 9, pp. 4222–4236, Nov. 2010.Google Scholar
A., Taherpour, Y., Norouzi, M., Nasiri-Kenari, A., Jamshidi, and Z., Zeinalpour-Yazdi, “Asymptotically optimum detection of primary user in cognitive radio networks,” IET Commun., 1, no. 6, 1138–1145, Dec. 2007.Google Scholar
L., Talbi and G. Y., Delisle, “Experimental characterization of EHF multipath indoor radio channels,” IEEE J. Sel. Areas Commun., 14, no. 3, 431–440, Apr. 1996.Google Scholar
B., Talha and M., Patzold, “Channel models for mobile-to-mobile cooperative communication systems,” IEEE Veh. Technol. Mag., 6, no. 2, 33–43, 2011.Google Scholar
R., Tandra, Fundamental Limits on Detection in Low SNR, MS Thesis, University of California Berkeley, Spring 2005.Google Scholar
R., Tandra and A., Sahai, “SNR walls for feature detectors,” Proc. 2nd IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySpan 2007), Dublin, Ireland, pp. 559–570, Apr. 2007.Google Scholar
R., Tandra and A., Sahai, “SNR walls for signal detection,” IEEE Journal Sel. Topics Signal Process., 2, no. 1, 4–17, Feb. 2008.Google Scholar
R., Tandra and A., Sahai, “Overcoming SNR walls through macroscale features,” Forty-Sixth Annual Allerton Conference, Allerton House, UIUC, IL, pp. 583–590, Sep. 23–26, 2008.Google Scholar
S., Tantaratana and H. V., Poor, “Asymptotic efficiencies of truncated sequential tests,” IEEE Trans. Inf. Theory, 28, no. 6, 911–923, Nov. 1982.Google Scholar
H. F. A., Tarboush, S., Khan, R., Nilavalan, H. S., Al-Raweshidy, and D., Budimir, “Reconfigurable wideband patch antenna for cognitive radio,” Antennas Propagation Conference, 2009, Nov. 2009, pp. 141–144.Google Scholar
G., Taricco, “Optimization of linear cooperative spectrum sensing for cognitive radio networks,” IEEE J. Sel. Topics Signal Process., 5, no. 1, 77–86, Nov. 2009.Google Scholar
A. G., Tartakovsky and G. V., Moustakides, “State-of-the-art in Bayesian changepoint detection,” Sequential Anal., 29, no. 2, 125–145, Apr. 2009.Google Scholar
A. G., Tartakovsky, M., Pollak, and A. S., Polunchenko, “Third-order asymptotic optimality of the generalized Shiryaev-Roberts changepoint detection procedures,” Teor. Veroyatnost. i Primenon., 56, no. 3, 534–565, 2011, and Theory Probab. Appl., to be published.Google Scholar
A. G., Tartakovsky and A. S., Polunchenko, “Quickest changepoint detection in distributed multisensor systems under unknown parameters,” Proc. 11th Int. Conf. Information Fusion, Cologne, Germany, June 30–July 3, 2008.Google Scholar
A. G., Tartakovsky and V. V., Veeravalli, “Change-point detection in multichannel and distributed systems with applications,” in N., Mukhopadhyay, S., Datta, and S., Chattopadhyay (eds.), Applications of Sequential Methodologies, pp. 331–363, Marcel Dekker, Inc., 2004.Google Scholar
A. G., Tartakovsky and V. V., Veeravalli, “Asymptotically optimal quickest change detection in distributed sensor systems,” Sequential Anal., 27, no. 4, 441–475, 2008.Google Scholar
C., Tekin and M., Liu, “Online learning in opportunistic spectrum access: a restless bandit approach,” Proc. 30th IEEE Int. Conf. Computer Communications, Shanghai, China, Apr. 10–15, 2011.Google Scholar
E., Telatar, “Capacity of multi-antenna Gaussian channels,” European Trans. Telecommun., 10, no. 6, 585–596, Nov. 1999.Google Scholar
J., Tellado, ed., Multicarrier Modulation with Low PAR: Applications to DSL and Wireless. Kluwer Academic Publishers, 2000.
N. M., Temme, “Asymptotic and numerical aspects of the noncentral chi-square distribution,” Computers Math. Applic., 25, no. 5, 55–63, 1993.Google Scholar
“The Universal Software Radio Peripheral,” www.ettus.com/.
S. C. A., Thomopoulos, R., Viswanathan, and D. K., Bougoulias, “Optimal distributed decision fusion,” IEEE Trans. Aerosp. Electron. Syst., 25, no. 5, 761–765, Sep. 1989.Google Scholar
Z. Tian, andG., Giannakis, “Compressed sensing for wideband cognitive radios,” IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP., 4, Apr. 2007, IV-1357–IV–1360.Google Scholar
M., Toeltsch, J., Laurila, K., Kalliola, A. F., Molisch, P., Vainikainen, and E., Bonek, “Statistical characterization of urban spatial radio channels,” IEEE J. Sel. Areas Commun., 20, no. 3, 539–549, Apr. 2002.Google Scholar
M., Tokic, “Adaptive -greedy exploration in reinforcement learning based on value differences,” in R., Dillmann, J., Beyerer, U. D., Hanebeck, and T., Schultz (eds.), KI 2010: Advances in Artificial Intelligence, Lecture Notes in Computer Science, vol. 6359, pp. 203–210, Springer, 2010.Google Scholar
P., Tortelier and M. M., Azeem, “Improving the erasure recovery performance of short codes for opportunistic spectrum access,” 14th International Symposium on Wireless Personal Multimedia Communications (WPMC'11), Brest, France, Oct. 3–7, 2011.
S., Toumpis and A. J., Goldsmith, “Capacity regions for wireless ad hoc networks,” IEEE Trans. Wireless Commun., 2, no. 4, 736–748, July 2003.Google Scholar
D. N. C., Tse and P., Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, 2005.Google Scholar
J. N., Tsitsiklis, “Asynchronous stochastic approximation and Q-learning,” Mach. Learn., 16, no. 3, 185–202, Sep. 1994.Google Scholar
,Ultra-wideband wireless communications – theory and applications, IEEE J. Sel. Areas Commun., 24, no. 4, Apr. 2006.
J., Unnikrishnan and V. V., Veeravalli, “Algorithms for dynamic spectrum access with learning for cognitive radio,” IEEE Trans. Signal Process., 58, no. 2, 750–760, Feb. 2010.Google Scholar
J., Unnikrishnan, V. V., Veeravalli, and S., Meyn, “Minimax robust quickest change detection,” IEEE Trans. Inf. Theory, 57, no. 3, 1604–1614, Mar. 2011.Google Scholar
“Urban transmission loss models for mobile radio in the 900 and 1800 MHz bands,” European Co-operative in the Field of Science and Technical Research EURO-COST 231, Rev. 2, The Hague, Sep. 1991.
H., Urkowitz, “Energy detection of unknown deterministic signals,” Proc. IEEE, 55, no. 4, 523–531, Apr. 1967.Google Scholar
J., van de Beek, M., Sandell, and P., Borjesson, “ML estimation of time and frequency offset in OFDM systems,” IEEE Trans. Signal Process., 45, no. 7, 1800–1805, July 1997.Google Scholar
P. P., Varaiya, J. C., Walrand, and C., Buyukkoc, “Extensions of the multiarmed bandit problem: the discounted case,” IEEE Trans. Autom. Control, AC–30, no. 5, 426–439, May 1985.Google Scholar
P. K., Varshney, Distributed Detection and Data Fusion, Springer-Verlag, 1996.Google Scholar
V. V., Veeravalli, “Decentralized quickest change detection,” IEEE Trans. Inf. Theory, 47, no. 4, 1657–1665, May 2001.Google Scholar
V. V., Veeravalli, T., Basar, and H. V., Poor, “Decentralized sequential detection with a fusion center performing the sequential test,” IEEE Trans. Inf. Theory, 39, no. 2, 433–442, Mar. 1993.Google Scholar
V. V., Veeravalli and C. W., Baum, “Asymptotic efficiency of a sequential multihypothesis test,” IEEE Trans. Inf. Theory, 41, no. 6, 1994–1997, Nov. 1995.Google Scholar
S., Verdú, “On channel capacity per unit cost,” IEEE Trans. Inf. Theory, 36, no. 5, 1019–1030, Sep. 1990.Google Scholar
S., Verdú and T. S., Han, “A general formula for channel capacity,” IEEE Trans. Inf. Theory, 40, no. 4, pp. 1147–1157, July 1994.Google Scholar
J., Vermorel and M., Mohri, “Multi-armed bandit algorithm and empirical evaluation,” in J., Ceama, R., Camacho, P., Brazdil, A., Jorge, and L., Torgo (eds.), Machine Learning: ECML 2005, Lecture Notes in Computer Science, 3720/2005, 437–448, 2005.Google Scholar
W., Vickrey, “Counterspeculation, auctions, and competitive sealed tenders,” J. Financ., 16, no. 1, 8–37, Mar. 1961.Google Scholar
S., Vishwanath, N., Jindal, and A., Goldsmith, “Duality, achievable rates, and sum-rate capacity of Gaussian MIMO broadcast channels,” IEEE Trans. Inf. Theory, 49, no. 10, 2658–2668, Oct. 2003.Google Scholar
R., Viswanathan and P. K., Varshney, “Distributed detection with multiple sensors: Part I – Fundamentals,” Proc. IEEE, 85, no. 1, 54–63, Jan. 1997.Google Scholar
M., Vu, N., Devroye, M., Sharif, and V., Tarokh, “Scaling laws of cognitive networks,” Proc. of the IEEE International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), Orlando, FL, July 31–Aug 3, 2007, pp. 2–8.Google Scholar
A., Wald, “Sequential tests of statistical hypotheses,” Ann. Math. Stat., 16, no. 2, 117–186, June 1945.Google Scholar
A., Wald and J., Wolfowitz, “Optimum character of the sequential probability ratio test,” Ann. Math. Stat., 19, no. 3, 326–339, 1948.Google Scholar
B., Wang and K. J. R., Liu, “Advances in cognitive radio networks: a survey,” IEEE J. Sel. Topics Signal Process., 5, no. 1, 5–23, Feb. 2011.Google Scholar
B., Wang, Y., Wu, and K. J. R., Liu, “Game theory for cognitive radio networks: an overview,” Comput. Netw., 54, no. 14, 2537–2561, Oct. 2010.Google Scholar
C.-C., Wang, S. R., Kulkarni, and H. V., Poor, “Bandit problems with side observations,” IEEE Trans. Autom. Control, 50, no. 3, 338–355, Mar. 2005.Google Scholar
C.-C., Wang, S. R., Kulkarni, and H. V., Poor, “Arbitrary side observations in bandit problems,” Adv. Appl. Math. — Special Issue Dedicated to Dr. David P. Robbins, 34, no. 4, 903–938, May 2005.Google Scholar
C.-J., Wang and W. T., Tsai, “A slot antenna module for switchable radiation patterns,” IEEE Antennas and Wireless Propag. Lett., 4, 202–204, 2005.Google Scholar
H., Wang, J., Lee, S., Kim, and D., Hong, “Capacity enhancement of secondary links through spatial diversity in spectrum sharing,” IEEE Trans. Wireleless Commun., 9, no. 2, 494–499, Feb. 2010.Google Scholar
H., Wang, G., Noh, D., Kim, S., Kim, and D., Hong, “Advanced sensing techniques of energy detection in cognitive radios,” J. Commun. Netw., 12, no. 1, 19–29, Feb. 2010.Google Scholar
J., Wang, G., Scutari, and D. P., Palomar, “Robust MIMO cognitive radio via game theory,” IEEE Trans. Signal Process., 59, no. 3, 1183–1201, Mar. 2011.Google Scholar
K., Wang and L., Chen, “On optimality of myopic policy for restless multi-armed bandit problem: an axiomatic approach,” IEEE Trans. Signal Process., 60, no. 1, 300–309, Jan. 2012.Google Scholar
C. J. C. H., Watkins, Learning from Delayed Rewards, Ph.D. Dissertation, University of Cambridge, Cambridge, UK, 1989.Google Scholar
C. J. C. H., Watkins and P., Dayan, “Q-learning,” Mach. Learn., 8, 279–292, 1992.Google Scholar
R. R., Weber and G., Weiss, “On an index policy for restless bandits,” J. Appl. Prob., 27, no. 3, 637–648, Sep. 1990.Google Scholar
R. R., Weber and G., Weiss, “Addendum to ‘On an index policy for restless bandits’,” Adv. Appl. Prob., 23, no. 2, 429–430, June 1991.Google Scholar
H., Weingarten, Y., Steinberg, and S., Shamai, “The capacity region of the Gaussian multiple-input multiple-output broadcast channel,” IEEE Trans. Inf. Theory, 52, no. 9, 3936–3964, Sep. 2006.Google Scholar
T., Weiss and F., Jondral, “Spectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,” IEEE Commun. Magazine, 42, no. 3, S8–14, Mar. 2004.Google Scholar
J., Weitzen and T. J., Lowe, “Measurement of angular and distance correlation properties of log-normal shadowing at 1900 MHz and its application to design of PCS systems,” IEEE Trans. Veh. Technol., 51, no. 2, 265–273, Mar. 2002.Google Scholar
P., Whittle, “Arm-acquiring bandits,” Ann. Probab., 9, no. 2, 284–292, Apr. 1981.Google Scholar
P., Whittle, “Restless bandits: activity allocation in a changing world,” J. Appl. Prob., 25, 287–298, 1988.Google Scholar
J., Wiart, P., Pajusco, A., Levy, and J. C., Bic, “Analysis of microcellular wide band measurements in Paris,” Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 144–147, 1995.Google Scholar
B., Wild and K., Ramchandran, “Detecting primary receivers for cognitive radio applications,” Proc. 1st IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2005), Baltimore, MD, USA, Nov. 8–11, 2005, pp. 124–130.Google Scholar
M. Z., Win and R. A., Scholtz, “Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for wireless multiple-access communications,” IEEE Trans. Commun., 48, no. 4, 679–689, Apr. 2000.Google Scholar
L. A., Wolsey, Integer Programming. Wiley, 1998.Google Scholar
C., Wu, K., Chowdhury, M., Di Felice, and W., Meleis, “Spectrum management of cognitive radio using multi-agent reinforcement learning,” Proc. 9th Int. Conf. Autonomous Agents and Multiagent Systems (AAMAS 2010), Toronto, Canada, May 10–14, 2010.Google Scholar
G., Wu, S., Talwar, K., Johnsson, N., Himayat, and K., Johnson, “M2M: from mobile to embedded internet,” IEEE Commun. Magazine, 49, no. 4, 36–43, Apr. 2011.Google Scholar
W., Wu, S., Vishwanath, and A., Arapostathis, “Capacity of a class of cognitive radio channels: interference channels with degraded message sets,” IEEE Trans. Inf. Theory, 53, no. 11, 4391–4399, Nov. 2007.Google Scholar
Z., Wu and B., Natarajan, “Interference tolerant agile cognitive radio: maximize channel capacity of cognitive radio,” Proc. IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, Jan. 11–13, 2007, pp. 1027–1031.Google Scholar
S., Wyne, T., Santos, A. P., Singh, F., Tufvesson, and A. F., Molisch, “Characterisation of a time-variant wireless propagation channel for outdoor short-range sensor networks,” IET Communications, 4, 253–264, 2010.Google Scholar
Y., Xie and A. J., Goldsmith, “Diversity-multiplexing-delay tradeoffs in MIMO multi-hop networks with ARQ,” Proc. IEEE International Symposium on Information Theory, Austin, TX, June 13–18, 2010, pp. 2208–2212.Google Scholar
Y., Xie, D., Gündüz, and A. J., Goldsmith, “Multihop MIMO relay networks with ARQ,” Proc. IEEE Global Telecommunications Conference (GLOBECOM), Honolulu, HI, Nov. 30 – Dec. 4, 2009. pp. 1–6.Google Scholar
Y., Xin, H., Zhang, and S., Rangarajan, “SSCT: a simple sequential spectrum sensing scheme for cognitive radio,” Proc. IEEE Global Communications Conf. (GLOBECOM 2009), Honolulu, HI, Nov. 30–Dec. 4, 2009.Google Scholar
F., Xue and P. R., Kumar, “Scaling laws for ad-hoc wireless networks: an information theoretic approach,” NOW J. Found. Trends Netw., 1, no. 2, 145–270, 2006.Google Scholar
K., Yamazaki, Essays on Sequential Analysis: Multi-Armed Bandit with Availability Constraints and Sequential Change Detection and Identification, Ph.D. Dissertation, Princeton University, Princeton, NJ, Apr. 2009.Google Scholar
E., Yang and D., Gu, “Multiagent reinforcement learning for multi-robot systems: a survey,” Technical Report CSM-404, Department of Computer Science, University of Essex, UK, 2004.Google Scholar
J., Yang, R., Brodersen, and D., Tse, “Addressing the dynamic range problem in cognitive radios,” IEEE International Conference on Communications, ICC., June 2007, pp. 5183–5188.Google Scholar
K., Yao and E. M., Biglieri, “Multidimensional error bounds for digital communication systems,” IEEE Trans. Inf. Theory, IT-26, no. 4, 454–464, July 1980.Google Scholar
K., Yao and R. M., Tobin, “Moment space upper and lower error bounds for digital systems with intersymbol interference,” IEEE Trans. Inf. Theory, IT-22, no. 1, 65–74, Jan. 1976.Google Scholar
K.-L. A., Yau, P., Komisarczuk, and P. D., Teal, “A context-aware and intelligent dynamic channel selection scheme for cognitive radio networks,” Proc. Conf. Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM 2009), Hanover, Germany, June 2009.Google Scholar
K.-L. A., Yau, P., Komisarczuk, and P. D., Teal, “Context awareness and intelligence in distributed cognitive radio networks: a reinforcement learning approach,” Proc. 11th Australian Communications Theory Workshop (AusCTW 2010), Canberra, Australia, Feb. 2010.Google Scholar
K.-L. A., Yau, P., Komisarczuk, and P. D., Teal, “Achieving efficient and optimal joint action in distributed cognitive radio networks using payoff propagation,” in Proc. IEEE Int. Conf. Communications (ICC 2010), Cape Town, South Africa, May 23–27, 2010.Google Scholar
C., Yin, L., Gao, and S., Cui, “Scaling laws for overlaid wireless networks: a cognitive radio network versus a primary network,” IEEE/ACM Trans. Netw., 18, no. 4, 1317–1329, Aug. 2010.Google Scholar
W., Yuan, H., Leung, S., Chen, and W., Cheng, “A distributed sensor selection mechanism for cooperative spectrum sensing,” IEEE Trans. Signal Process., 59, no. 12, 6033–6044, Dec. 2011.Google Scholar
Y., Yuan, P., Bahl, R., Chandra, et al., “KNOWS: Cognitive radio networks over white spaces,” IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2007. DySPAN 2007, Apr. 2007, pp. 416–427.Google Scholar
T., Yücek and H., Arslan, “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE Comm. Surveys & Tutorials, 11, no. 1, 116–130, first quarter 2009.Google Scholar
L., Zacharias and R., Sundaresan, “Decentralized sequential change detection using physical layer fusion,” IEEE Trans. Wireless Commun., 7, no. 12, 4999–5008, Dec. 2008.Google Scholar
Y., Zeng, C. L., Koh, and Y. C., Liang, “Maximum eigenvalue detection: theory and applications,” Proc. IEEE International Conference on Communications (ICC), Beijing, China, pp. 4160–4164, May 2008.Google Scholar
Y., Zeng and Y. C., Liang, “Covariance based signal detections for cognitive radios,” Proc. 2nd IEEE Int. Symp. New Frontiers in Dynamic Spectrum Access Networks (DySpan 2007), Dublin, Ireland, pp. 202–207, Apr. 2007.Google Scholar
Y., Zeng and Y. C., Liang, “Maximum–minimum eigenvalue detection for cognitive radio,” Proc. 18th IEEE Int. Symp. Personal, Indoor, and Mobile Radio Communications (PIMRC 2007), Athens, Greece, Sep. 2007.Google Scholar
Y., Zeng and Y. C., Liang, “Eigenvalue-based spectrum sensing algorithms for cognitive radio,” IEEE Trans. Commun., 57, no. 6, 1784–1793, June 2009.Google Scholar
Y., Zeng, Y. C., Liang, E. C. Y., Peh, and A. T., Hoang, “Cooperative covariance and eigenvalue based detections for robust sensing,” Proc. IEEE Global Communications Conf. (GLOBECOM 2009), Honolulu, HI, Nov. 30–Dec. 4, 2009, pp. 1–6.Google Scholar
D., Zhang and N., Mandayam, “Bandwidth exchange for fair secondary coexistence in TV white space,” Proceedings of International ICST Conference on Game Theory for Networks(GameNets), Apr. 2011.Google Scholar
D., Zhang, R., Shinkuma, and N., Mandayam, “Bandwidth exchange: an energy conserving incentive mechanism for cooperation,” IEEE Trans. Wireless Commun., 9, no. 6, 2055–2065, June 2010.Google Scholar
R., Zhang and Y.-C., Liang, “Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks,” IEEE J. Sel. Topics Signal Process., 2, no. 1, 88–102, Feb. 2008.Google Scholar
Y., Zhang, J., Zhang, D., Dan, et al., “A novel spatial autocorrelation model of shadow fading in urban macro environments,” Proc. IEEE GLOBECOM 2008, 2008.Google Scholar
Y. P., Zhang and Y., Hwang, “Characterization of UHF radio propagation channels in tunnel environments for microcellular and personal communications,” IEEE Trans. Veh. Technol., 47, no. 1, 283–296, Feb. 1998.Google Scholar
Q., Zhao, L., Tong, and A., Swami, “Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework,” IEEE J. Sel. Areas Commun., 25, no. 3, 224–232, Apr. 2007.Google Scholar
Q., Zhao, B., Krishnamachari, and K., Liu, “On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance,” IEEE Trans. Wireless Commun., 7, no. 12, 5431–5440, Dec. 2008.Google Scholar
Q., Zhao, L., Tong, A., Swami, and Y., Chen, “Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: a POMDP framework,” IEEE J. Sel. Areas Commun., 25, no. 3, 589–600, Apr. 2007.Google Scholar
Q., Zhao and J., Ye, “Quickest detection in multiple on-off processes,” IEEE Trans. Signal Process., 58, no. 12, 5994–6006, Dec. 2010.Google Scholar
X., Zhao, J., Kivinen, P., Vainikainen, and K., Skog, “Propagation characteristics for wideband outdoor mobile communications at 5.3 GHz,” IEEE J. Sel. Areas Commun., 20, no. 3, 507–514, Apr. 2002.Google Scholar
K., Zheng, H., Li, S. M., Djouadi, and J., Wang, “Spectrum sensing in low SNR regime via stochastic resonance,” Proc. 44th Annu. Conf. Information Sciences and Systems (CISS 2010), Princeton, NJ, Mar. 17–19, 2010.Google Scholar
L., Zheng and D. N. C., Tse, “Diversity and multiplexing: a fundamental trade-off in multiple antenna channels,” IEEE Trans. Inf. Theory, 49, no. 5, 1073–1096, May 2003.Google Scholar
F., Zhu and S.-W., Seo, “Enhanced robust cooperative spectrum sensing in cognitive radio,” J. Commun. Netw., 11, no. 2, 122–133, Apr. 2009.Google Scholar
Q., Zou, S., Zheng, and A. H., Sayed, “Cooperative sensing via sequential detection,” IEEE Trans. Signal Process., 58, no. 12, 6266–6283, Dec. 2010.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×