{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:15:43Z","timestamp":1756167343339,"version":"3.44.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/mass.2012.6502534","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T17:30:09Z","timestamp":1366997409000},"page":"344-352","source":"Crossref","is-referenced-by-count":0,"title":["Goodput maximization in opportunistic spectrum access radio links with imperfect spectrum sensing and fec-based packet protection"],"prefix":"10.1109","author":[{"given":"Maurizio A.","family":"Bonuccelli","sequence":"first","affiliation":[{"name":"Dipartimento di Informatica University of Pisa Largo Bruno Pontecorvo 3, I-56127 Pisa, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Donatella","family":"Ermini","sequence":"additional","affiliation":[{"name":"Computer Science Department University of Rome &#x201C;La Sapienza&#x201D; Via Salaria 113, I-00198 Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Loreto","family":"Pescosolido","sequence":"additional","affiliation":[{"name":"Computer Science Department University of Rome &#x201C;La Sapienza&#x201D; Via Salaria 113, I-00198 Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chiara","family":"Petrioli","sequence":"additional","affiliation":[{"name":"Computer Science Department University of Rome &#x201C;La Sapienza&#x201D; Via Salaria 113, I-00198 Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.84"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.01.070270"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.201"},{"journal-title":"A Practical Guide to Error-Control Coding Using MATLAB","year":"2010","author":"jiang","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060869"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.26"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2007.206"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070391"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2158673"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.111510.00108"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424754"},{"key":"20","article-title":"Optimal packet size in error-prone channel for IEEE 802.11 distributed coordination function","author":"yin","year":"0","journal-title":"Proc IEEE Wireless Communications and Networking Conference WCNC 2004 Mar 21-25 2004"},{"key":"22","article-title":"Throughput Optimization Using Adaptive Techniques","author":"yoo","year":"2006","journal-title":"IEEE Commun Letters"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.54"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462063"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1921621.1921622"},{"key":"26","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-0-387-09490-8_16","article-title":"Throughput and Delay Bounds for Cognitive Transmissions","volume":"265","author":"borgonovo","year":"2008","journal-title":"IFIP Advances in Ad Hoc Networking"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2009.5450283"},{"key":"28","article-title":"Throughput Comaparison in Cognitive Radio Networks","author":"gao","year":"0","journal-title":"Proc Int Conf Electrical Engineering\/Electronics Computer Telecommunications and Information Technology (ECTI-CON) May 19-21 2010"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2010.5629647"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"journal-title":"Cognitive Radio An Integrated Agent Architecture for Software Defined Radio","year":"2000","author":"mitola iii","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.01.002"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"journal-title":"Markov Processes for Stochastic Modeling","year":"2009","author":"ibe","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2015710"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481338"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/BF00773482"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.358852"},{"key":"31","article-title":"Detection Theory","volume":"2","author":"kay","year":"1998","journal-title":"Fundamentals of Statistical Signal Processing"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.361604"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.01.001"},{"key":"8","volume":"2","author":"feller","year":"1966","journal-title":"An Introduction to Probability Theory and Its Applications (Second Ed )"}],"event":{"name":"2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)","start":{"date-parts":[[2012,10,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2012,10,11]]}},"container-title":["2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6493538\/6502495\/06502534.pdf?arnumber=6502534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:18:49Z","timestamp":1756153129000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6502534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/mass.2012.6502534","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}