{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T07:18:37Z","timestamp":1648711117346},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,7,29]],"date-time":"2015-07-29T00:00:00Z","timestamp":1438128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"European Social Fund-ESF and Greek national funds","award":["Heracleitus II"],"award-info":[{"award-number":["Heracleitus II"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s11277-015-2955-4","type":"journal-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T22:55:40Z","timestamp":1438037740000},"page":"751-769","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Reinforcement-Learning Based Cognitive Scheme for Opportunistic Spectrum Access"],"prefix":"10.1007","volume":"86","author":[{"given":"Angeliki V.","family":"Kordali","sequence":"first","affiliation":[]},{"given":"Panayotis G.","family":"Cottis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,29]]},"reference":[{"issue":"4","key":"2955_CR1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/98.788210","volume":"6","author":"J Mitola","year":"1999","unstructured":"Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13\u201318.","journal-title":"IEEE Personal Communications"},{"issue":"13","key":"2955_CR2","doi-asserted-by":"crossref","first-page":"2127","DOI":"10.1016\/j.comnet.2006.05.001","volume":"50","author":"IF Akyildiz","year":"2006","unstructured":"Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). Next generation\/dynamic spectrum access\/cognitive radio wireless networks: A survey. Computer Networks Journal, 50(13), 2127\u20132159.","journal-title":"Computer Networks Journal"},{"issue":"1","key":"2955_CR3","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/SURV.2009.090109","volume":"11","author":"T Ycek","year":"2009","unstructured":"Ycek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Communications Surveys and Tutorials, 11(1), 116\u2013130.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"2955_CR4","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCOM.2008.4481338","volume":"46","author":"A Ghasemi","year":"2008","unstructured":"Ghasemi, A., & Sousa, E. S. (2008). Spectrum sensing in cognitive radio networks: Requirements, challenges and design trade-offs. IEEE Communications Magazine, 46(4), 32\u201339.","journal-title":"IEEE Communications Magazine"},{"key":"2955_CR5","doi-asserted-by":"crossref","unstructured":"Tragos, E. Z., Zeadally, S., Fragkiadakis, A. G., & Siris, V. A. (2013). Spectrum assignment on cognitive radio networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 15(3).","DOI":"10.1109\/SURV.2012.121112.00047"},{"key":"2955_CR6","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","volume":"25","author":"S Haykin","year":"2005","unstructured":"Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 25, 201\u2013220.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"2955_CR7","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCOM.2007.358851","volume":"45","author":"S Geirhofer","year":"2007","unstructured":"Geirhofer, S., Tong, L., & Sandler, M. (2007). Dynamic spectrum access in the time domain: Modeling and exploiting white space. IEEE Communications Magazine, 45(5), 66\u201372.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"2955_CR8","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/JCN.2009.6391385","volume":"11","author":"Li Xiukui","year":"2009","unstructured":"Xiukui, Li, & Reza Zekavat, Seyed A. (2009). Cognitive radio based spectrum sharing: Evaluating channel availability via traffic pattern prediction. Journal of Communications and Networks, 11(2), 104\u2013114.","journal-title":"Journal of Communications and Networks"},{"key":"2955_CR9","unstructured":"Canberk, B., Akyildiz, I. F., & Oktug, S. (2000). Primary user activity modeling using first-difference filter clustering and correlation in cognitive radio networks. IEEE\/ACM Transactions on Networking, 19(1)."},{"key":"2955_CR10","unstructured":"Yun, G., Grammenos, R. C., Yang, Y., & Wang, W. (2010). Performance analysis of selective opportunistic spectrum access with traffic prediction. IEEE Transactions on Vehicular Technology, 59(4)."},{"issue":"3","key":"2955_CR11","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1007\/s11277-012-0906-x","volume":"71","author":"J Huang","year":"2013","unstructured":"Huang, J., Zhou, H., Chen, Y., Chen, B., Zhu, X., & Kong, R. (2013). Optimal channel sensing order for various applications in cognitive radio networks. Wireless Personal Communications, 71(3), 1721\u20131740.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"2955_CR12","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1109\/T-WC.2009.071363","volume":"8","author":"H Jiang","year":"2009","unstructured":"Jiang, H., Lai, L., Fan, R., & Poor, H. V. (2009). Optimal selection of channel sensing order in cognitive radio. IEEE Transactions on Wireless Communications, 8(1), 297\u2013307.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"2955_CR13","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/TNET.2009.2014460","volume":"17","author":"NB Chang","year":"2009","unstructured":"Chang, N. B., & Liu, M. (2009). Optimal channel probing and transmission scheduling for opportunistic spectrum access. IEEE\/ACM Transactions on Networking, 17(6), 1805\u20131818.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"2955_CR14","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1109\/JSAC.2011.110402","volume":"29","author":"HT Cheng","year":"2011","unstructured":"Cheng, H. T., & Zhuang, W. (2011). Simple channel sensing order in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 29(4), 676\u2013688.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"11","key":"2955_CR15","doi-asserted-by":"crossref","first-page":"2312","DOI":"10.1109\/JSAC.2013.131123","volume":"31","author":"C-H Liu","year":"2013","unstructured":"Liu, C.-H., Tran, J. A., Pawelczak, P., & Cabric, D. (2013). Traffic-aware channel sensing order in dynamic spectrum access networks. IEEE Journal on Selected Areas in Communications, 31(11), 2312\u20132323.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2955_CR16","volume-title":"Reinforcement learning","author":"RS Sutton","year":"1998","unstructured":"Sutton, R. S., & Barto, A. G. (1998). Reinforcement learning. Cambridge, MA: MIT Press."},{"issue":"3\/4","key":"2955_CR17","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1023\/A:1022676722315","volume":"8","author":"CJCH Watkins","year":"1992","unstructured":"Watkins, C. J. C. H., & Dayan, P. (1992). Technical note: Q-learning. Machine Learning, 8(3\/4), 279\u2013292.","journal-title":"Machine Learning"},{"key":"2955_CR18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling, L. P., Littman, M. L., & Moore, A. W. (1996). Reinforcement learning: A survey. Journal of Artificial Intelligence Research, 4, 237\u2013285.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"2955_CR19","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1023\/A:1007678930559","volume":"38","author":"S Singh","year":"2000","unstructured":"Singh, S., Jaakkola, T., Littman, M. L., & Szepesvri, C. (2000). Convergence results for single-step on-policy reinforcement-learning algorithms. Machine Learning, 38, 287\u2013308.","journal-title":"Machine Learning"},{"issue":"4","key":"2955_CR20","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1109\/TWC.2008.060869","volume":"7","author":"YC Liang","year":"2008","unstructured":"Liang, Y. C., Zeng, Y., Peh, E. C., & Hoang, A. T. (2008). Sensing throughput tradeoff in cognitive radio networks. IEEE Transactions on Wireless Communications, 7(4), 1326\u20131337.","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2955-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2955-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2955-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T16:09:17Z","timestamp":1567008557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2955-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,29]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["2955"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2955-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,29]]}}}