{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:44:05Z","timestamp":1725507845481},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883521","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"1422-1427","source":"Crossref","is-referenced-by-count":1,"title":["Retrospective spectrum access protocol: A payoff-based learning algorithm for cognitive radio networks"],"prefix":"10.1109","author":[{"given":"Stefano","family":"Iellamo","sequence":"first","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Marceau","family":"Coupechoux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2008.07.008"},{"key":"22","article-title":"A quantitative measure of fairness and discrimination for resource allocation in shared computer systems","author":"jain","year":"1984","journal-title":"Research Report TR-301"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1137\/100784163"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0027"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2012.02.017"},{"journal-title":"University of Pennsylvania Wharton School","year":"2006","author":"foster","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2008.02.011"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426834"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2000.2694"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/070680199"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2008.11.012"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2307\/2951778"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2307\/2951777"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/0040-5809(90)90011-J"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2681(98)00125-5"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248401"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462144"},{"key":"5","first-page":"121","article-title":"Foundations and applications of sensor management","author":"mahajan","year":"2007","journal-title":"Chapter Multi-armed Bandit Problems"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.1995.1014"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1111\/1467-937X.00119"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.03.008"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883521.pdf?arnumber=6883521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T16:53:33Z","timestamp":1496681613000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883521","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}