{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:10:54Z","timestamp":1761419454145,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61701097"],"award-info":[{"award-number":["61701097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001700","name":"MEXT","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001700","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10479-020-03885-1","type":"journal-article","created":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T20:17:26Z","timestamp":1609532246000},"page":"621-639","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Spectrum allocation strategy with a probabilistic preemption scheme in cognitive radio networks: analysis and optimization"],"prefix":"10.1007","volume":"310","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7642-3809","authenticated-orcid":false,"given":"Yuan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Wuyi","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Zsolt","family":"Saffer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,1]]},"reference":[{"key":"3885_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7314-6","volume-title":"Queueing theory for telecommunications: Discrete time modelling of a single node system","author":"A Alfa","year":"2010","unstructured":"Alfa, A. (2010). Queueing theory for telecommunications: Discrete time modelling of a single node system. New York: Springer."},{"key":"3885_CR2","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/COMST.2018.2794358","volume":"20","author":"M Amjad","year":"2018","unstructured":"Amjad, M., Rehmani, M. H., & Mao, S. (2018). Wireless multimedia cognitive radio networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 20, 1056\u20131103.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"3885_CR3","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2014.6766095","volume":"52","author":"K Arshad","year":"2014","unstructured":"Arshad, K., Mackenzie, R., Celentano, U., Drozdy, A., Leveil, S., Mange, G., et al. (2014). Resource management for QoS support in cognitive radio networks. IEEE Communications Magazine, 52(3), 114\u2013120.","journal-title":"IEEE Communications Magazine"},{"key":"3885_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2014-206","volume":"2014","author":"A Azarfar","year":"2014","unstructured":"Azarfar, A., Frigon, J., & Sans\u00f2, B. (2014). Priority queueing models for cognitive radio networks with traffic differentiation. EURASIP Journal on Wireless Communications and Networking, 2014, 1\u201321.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"2","key":"3885_CR5","first-page":"68","volume":"5","author":"B Benmammar","year":"2013","unstructured":"Benmammar, B., Amraoui, A., & Krief, F. (2013). A survey on dynamic spectrum access techniques in cognitive radio networks. International Journal of Communication Networks and Information Security, 5(2), 68\u201379.","journal-title":"International Journal of Communication Networks and Information Security"},{"issue":"6","key":"3885_CR6","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1002\/dac.3082","volume":"29","author":"L Chen","year":"2016","unstructured":"Chen, L., Huang, L., Xu, H., & Hu, J. (2016). Queueing analysis for preemptive transmission in underlay CRNs. International Journal of Communication Systems, 29(6), 1138\u20131155.","journal-title":"International Journal of Communication Systems"},{"key":"3885_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2011-1","volume":"2011","author":"P Chen","year":"2011","unstructured":"Chen, P., Zhang, Q., Zhang, Y., & Wang, Y. (2011). Performance analysis of spectrum sharing mechanisms in cognitive radio networks. EURASIP Journal on Wireless Communications and Networking, 2011, 1\u201315.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"3885_CR8","volume-title":"An introduction to optimization","author":"EKP Chong","year":"2011","unstructured":"Chong, E. K. P., & \u017bak, S. H. (2011). An introduction to optimization (3rd ed.). New York: Wiley.","edition":"3"},{"key":"3885_CR9","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970937","volume-title":"Iterative methods for solving linear systems","author":"A Greenbaum","year":"1997","unstructured":"Greenbaum, A. (1997). Iterative methods for solving linear systems. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM)."},{"key":"3885_CR10","doi-asserted-by":"publisher","first-page":"15754","DOI":"10.1109\/ACCESS.2018.2802450","volume":"6","author":"F Hu","year":"2018","unstructured":"Hu, F., Chen, B., & Zhu, K. (2018). Full Spectrum sharing in cognitive radio networks toward 5G: A survey. IEEE Access, 6, 15754\u201315776.","journal-title":"IEEE Access"},{"key":"3885_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MWC.2017.1600404","volume":"24","author":"AA Khan","year":"2017","unstructured":"Khan, A. A., Rachedi, M. H., & Rachedi, A. (2017). Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions. IEEE Wireless Communications, 24, 17\u201325.","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"3885_CR12","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/COMST.2014.2352118","volume":"17","author":"C Liang","year":"2015","unstructured":"Liang, C., & Yu, F. (2015). Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358\u2013380.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"3885_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comnet.2015.01.019","volume":"81","author":"J Mirinho","year":"2015","unstructured":"Mirinho, J., & Monteiro, E. (2015). CORHYS: Hybrid signaling for opportunistic distributed cognitive radio. Computer Networks, 81, 19\u201342.","journal-title":"Computer Networks"},{"key":"3885_CR14","doi-asserted-by":"crossref","unstructured":"Nguyen-Thanh, N., Pham, A. T., & Nguyen, V. T. (2014). Medium access control design for cognitive radio networks: A survey. IEICE Transactions on Communications, E97.B(2), 359\u2013374.","DOI":"10.1587\/transcom.E97.B.359"},{"issue":"11","key":"3885_CR15","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/JSAC.2014.141115","volume":"32","author":"Y Wu","year":"2014","unstructured":"Wu, Y., Hu, F., Kumar, S., Zhu, Y., Talari, A., Rahnavard, N., et al. (2014). A learning-based QoE-driven spectrum handoff scheme for multimedia transmissions over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 32(11), 2134\u20132148.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"3885_CR16","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/JCN.2014.000030","volume":"16","author":"Y Zhao","year":"2014","unstructured":"Zhao, Y., Jin, S., & Yue, W. (2014). A novel spectrum access strategy with $$\\alpha $$-retry policy in cognitive radio networks: A queueing-based analysis. Journal of Communications and Networks, 16(2), 193\u2013201.","journal-title":"Journal of Communications and Networks"},{"issue":"1","key":"3885_CR17","first-page":"157","volume":"11","author":"Y Zhao","year":"2015","unstructured":"Zhao, Y., Jin, S., & Yue, W. (2015). Optimization for cognitive radio channel allocation strategy with access probability and threshold. Pacific Journal of Optimization, 11(1), 157\u2013176.","journal-title":"Pacific Journal of Optimization"},{"issue":"3","key":"3885_CR18","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.3934\/jimo.2017001","volume":"13","author":"Y Zhao","year":"2017","unstructured":"Zhao, Y., & Yue, W. (2017). Cognitive radio networks with multiple secondary users under two kinds of priority schemes: Performance comparison and optimization. Journal of Industrial and Management Optimization, 13(3), 1449\u20131466.","journal-title":"Journal of Industrial and Management Optimization"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-020-03885-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10479-020-03885-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-020-03885-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T10:20:35Z","timestamp":1646043635000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10479-020-03885-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["3885"],"URL":"https:\/\/doi.org\/10.1007\/s10479-020-03885-1","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"type":"print","value":"0254-5330"},{"type":"electronic","value":"1572-9338"}],"subject":[],"published":{"date-parts":[[2021,1,1]]},"assertion":[{"value":"19 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}