{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:41Z","timestamp":1750307201513,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T00:00:00Z","timestamp":1323129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,6]]},"DOI":"10.1145\/2079296.2079298","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Dynamic channel, rate selection and scheduling for white spaces"],"prefix":"10.1145","author":[{"given":"Bozidar","family":"Radunovic","sequence":"first","affiliation":[{"name":"Microsoft Research, Cambridge, UK"}]},{"given":"Alexandre","family":"Proutiere","sequence":"additional","affiliation":[{"name":"KTH, Sweden"}]},{"given":"Dinan","family":"Gunawardena","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, UK"}]},{"given":"Peter","family":"Key","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, UK"}]}],"member":"320","published-online":{"date-parts":[[2011,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.fcc.gov\/Daily_Releases\/Daily_Business\/2010\/db0923\/FCC-10-174Al.pdf","author":"FCC.","year":"2010","unstructured":"FCC. Second memorandum opinion and order, FCC 10-174. http:\/\/www.fcc.gov\/Daily_Releases\/Daily_Business\/2010\/db0923\/FCC-10-174Al.pdf , 2010 . FCC. Second memorandum opinion and order, FCC 10-174. http:\/\/www.fcc.gov\/Daily_Releases\/Daily_Business\/2010\/db0923\/FCC-10-174Al.pdf, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409981"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851203"},{"key":"e_1_3_2_1_5_1","volume-title":"NSDI","author":"Sen S.","year":"2010","unstructured":"S. Sen , N. Santhapuri , R. Choudhury , and S. Nelakuditi . CBAR: Constellation based rate adaptation in wireless networks . In NSDI , 2010 . S. Sen, N. Santhapuri, R. Choudhury, and S. Nelakuditi. CBAR: Constellation based rate adaptation in wireless networks. In NSDI, 2010."},{"key":"e_1_3_2_1_6_1","unstructured":"Ubiquiti. XR1 and XR7 radio modules. http:\/\/www.ubnt.com\/xrl.  Ubiquiti. XR1 and XR7 radio modules. http:\/\/www.ubnt.com\/xrl."},{"key":"e_1_3_2_1_7_1","volume-title":"DySpan","author":"Yuan Y.","year":"2007","unstructured":"Y. Yuan , P. Bahl , R. Chandra , P. Chou , J. I. Ferrell , T. Moscibroda , S. Narlanka , and Y. Wu . KNOWS: kognitiv networking over white spaces . In DySpan , 2007 . Y. Yuan, P. Bahl, R. Chandra, P. Chou, J. I. Ferrell, T. Moscibroda, S. Narlanka, and Y. Wu. KNOWS: kognitiv networking over white spaces. In DySpan, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409948"},{"key":"e_1_3_2_1_9_1","volume-title":"MIT","author":"Bicket J.","year":"2005","unstructured":"J. Bicket . Bit-rate selection in wireless networks. Master's thesis , MIT , 2005 . J. Bicket. Bit-rate selection in wireless networks. Master's thesis, MIT, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023663.1023687"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161107"},{"key":"e_1_3_2_1_12_1","volume-title":"The 802.11g 11 mb\/s rate is more robust than 6 mb\/s","author":"Huang D.","year":"2011","unstructured":"D. Huang , D. Malone , and K. Duffy . The 802.11g 11 mb\/s rate is more robust than 6 mb\/s . IEEE Transactions on Wireless Commutations , 10(4):1015--1020, 2011 . D. Huang, D. Malone, and K. Duffy. The 802.11g 11 mb\/s rate is more robust than 6 mb\/s. IEEE Transactions on Wireless Commutations, 10(4):1015--1020, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2041600"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.65"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070409"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025561"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2028970"},{"key":"e_1_3_2_1_18_1","first-page":"11","article-title":"Opportunistic spectrum access based on a constrained multi-armed bandit formulation","author":"Ai J.","year":"2009","unstructured":"J. Ai and A. Abouzeid . Opportunistic spectrum access based on a constrained multi-armed bandit formulation . Journal of Communications and Networks , 11 , 2009 . J. Ai and A. Abouzeid. Opportunistic spectrum access based on a constrained multi-armed bandit formulation. Journal of Communications and Networks, 11, 2009.","journal-title":"Journal of Communications and Networks"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2008.5074369"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_1_21_1","unstructured":"A. Garivier and E. Moulines. On upper-confidence bound policies for non-stationary bandit problems. http:\/\/front.math.ucdavis.edu\/0805.3415 2008.  A. Garivier and E. Moulines. On upper-confidence bound policies for non-stationary bandit problems. http:\/\/front.math.ucdavis.edu\/0805.3415 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.081020"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062155"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286604"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287858"},{"key":"e_1_3_2_1_26_1","unstructured":"Arquiva. http:\/\/www.arqiva.com\/.  Arquiva. http:\/\/www.arqiva.com\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111206"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893230"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530759"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546921","volume-title":"Prediction, Learning, and Games","author":"Cesa-Bianchi Nicolo","year":"2006","unstructured":"Nicolo Cesa-Bianchi and Gabor Lugosi . Prediction, Learning, and Games . Cambridge University Press , New York, NY, USA , 2006 . Nicolo Cesa-Bianchi and Gabor Lugosi. Prediction, Learning, and Games. Cambridge University Press, New York, NY, USA, 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368449"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833651"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707062"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457857"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.231342"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1040.0156"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2696-8"},{"key":"e_1_3_2_1_38_1","volume-title":"Mobicom Demo","author":"Gunawardena D.","year":"2011","unstructured":"D. Gunawardena and B. Radunovi\u0107 . Colombo SDK - simulating the innards of a wireless MAC . In Mobicom Demo , 2011 . D. Gunawardena and B. Radunovi\u0107. Colombo SDK - simulating the innards of a wireless MAC. In Mobicom Demo, 2011."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2003.817601"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.316"}],"event":{"name":"Co-NEXT '11: Conference on emerging Networking Experiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Tokyo Japan","acronym":"Co-NEXT '11"},"container-title":["Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2079296.2079298","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2079296.2079298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:16Z","timestamp":1750241176000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2079296.2079298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,6]]},"references-count":39,"alternative-id":["10.1145\/2079296.2079298","10.1145\/2079296"],"URL":"https:\/\/doi.org\/10.1145\/2079296.2079298","relation":{},"subject":[],"published":{"date-parts":[[2011,12,6]]},"assertion":[{"value":"2011-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}