{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:05:13Z","timestamp":1743073513213,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319403519"},{"type":"electronic","value":"9783319403526"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40352-6_9","type":"book-chapter","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T21:54:19Z","timestamp":1464386059000},"page":"104-115","source":"Crossref","is-referenced-by-count":1,"title":["Is Bayesian Multi-armed Bandit Algorithm Superior?: Proof-of-Concept for Opportunistic Spectrum Access in Decentralized Networks"],"prefix":"10.1007","author":[{"given":"Sumit J.","family":"Darak","sequence":"first","affiliation":[]},{"given":"Amor","family":"Nafkha","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Moy","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Palicot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,29]]},"reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","volume":"16","author":"A Asadi","year":"2014","unstructured":"Asadi, A., Wang, Q., Mancuso, V.: A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutorials 16(4), 1801\u20131819 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"9_CR2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6590055","volume":"20","author":"P Phunchongharn","year":"2013","unstructured":"Phunchongharn, P., Hossain, E., Kim, D.I.: Resource allocation for device-to-device communications underlaying LTE-advanced networks. IEEE Wirel. Commun. 20(4), 91\u2013100 (2013)","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"9_CR3","doi-asserted-by":"crossref","first-page":"1689","DOI":"10.1109\/SURV.2013.030713.00189","volume":"15","author":"Y Xu","year":"2013","unstructured":"Xu, Y., Anpalagan, A., Wu, Q., Shen, L., Gao, Z., Wang, J.: Decision-theoretic distributed channel selection for opportunistic spectrum access: strategies, challenges and solutions. IEEE Commun. Surv. Tutorials 15(4), 1689\u20131713 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"9_CR4","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1109\/JSAC.2011.110406","volume":"29","author":"A Anandkumar","year":"2011","unstructured":"Anandkumar, A., Michael, N., Tang, A., Swami, A.: Distributed algorithms for learning and cognitive medium access with logarithmic regret. IEEE J. Sel. Areas Commun. 29(4), 731\u2013745 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"9_CR5","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"issue":"11","key":"9_CR6","doi-asserted-by":"crossref","first-page":"5667","DOI":"10.1109\/TSP.2010.2062509","volume":"58","author":"K Liu","year":"2010","unstructured":"Liu, K., Zhao, Q.: Distributed learning in multi-armed bandit with multiple players. IEEE Trans. Signal Process. 58(11), 5667\u20135681 (2010)","journal-title":"IEEE Trans. Signal Process."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Zandi, M., Dong, M.: Learning-stage based decentralized adaptive access policy for dynamic spectrum access. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5323\u20135327, Vancouver, Canada, May 2013","DOI":"10.1109\/ICASSP.2013.6638679"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Darak, S.J., Zhang, H., Palicot, J., Moy, C.: Efficient decentralized dynamic spectrum learning and access scheme for multi-standard multi-user cognitive radio networks. In: 11th International Symposium on Wireless Communication Systems (IEEE ISWCS 2014), pp. 271\u2013275, Barcelona, Spain, August 2014","DOI":"10.1109\/ISWCS.2014.6933360"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Darak, S.J., Zhang, H., Palicot, J., Moy, C.: An efficient policy for D2D communications and energy harvesting in cognitive radios: go bayesian! In: 23rd European Signal Processing Conference (EUSIPCO), pp. 1236\u20131240, Nice, France, August 2015","DOI":"10.1109\/EUSIPCO.2015.7362580"},{"key":"9_CR10","unstructured":"Kaufmann, E., Capp\u00e9, O., Garivier, A.: On bayesian upper confidence bounds for bandit problems. In: 15th International Conference on Artificial Intelligence and Statistics, pp. 592\u2013600, La Palma, Canary Islands, April 2012"},{"issue":"11","key":"9_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCOMM.2014.2379663","volume":"32","author":"DT Hoang","year":"2014","unstructured":"Hoang, D.T., Niyato, D., Wang, P., Kim, D.I.: Opportunistic channel access and RF energy harvesting in cognitive radio networks. IEEE Trans. Sel. Areas Commun. 32(11), 1\u201314 (2014)","journal-title":"IEEE Trans. Sel. Areas Commun."},{"key":"9_CR12","unstructured":"Bahamou, S., Nafkha, A.: Noise uncertainty analysis of energy detector: bounded and unbounded approximation relationship. In: 21st European Signal Processing Conference (EUSIPCO), pp. 1\u20134, Marrakech, Morocco, September 2013"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Robert, C., Moy, C., Wang, C.X.: Reinforcement learning approaches and evaluation criteria for opportunistic spectrum access. In: IEEE International Conference on Communications (ICC), pp. 1508\u20131513, Sydney, Australia, June 2014","DOI":"10.1109\/ICC.2014.6883535"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cognitive Radio Oriented Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40352-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T20:30:28Z","timestamp":1567974628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40352-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319403519","9783319403526"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40352-6_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]}}}