{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:26:17Z","timestamp":1759937177969,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T00:00:00Z","timestamp":1464825600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T00:00:00Z","timestamp":1464825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["11171019, 71571014 and 71390334"],"award-info":[{"award-number":["11171019, 71571014 and 71390334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1137732 and 1241626"],"award-info":[{"award-number":["1137732 and 1241626"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0637-x","type":"journal-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T04:10:24Z","timestamp":1464840624000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Game-theoretic analysis of opportunistic spectrum sharing with imperfect sensing"],"prefix":"10.1186","volume":"2016","author":[{"given":"Fang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jinting","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wayne Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"637_CR1","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1023\/A:1011426600077","volume":"6","author":"J Mitola III","year":"2001","unstructured":"J Mitola III, Cognitive radio for flexible mobile multimedia communications. Mobile Netw. Appl. 6:, 435\u2013441 (2001).","journal-title":"Mobile Netw. Appl"},{"key":"637_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSP.2007.361604","volume":"24","author":"Q Zhao","year":"2007","unstructured":"Q Zhao, BM Sadler, A survey of dynamic spectrum access. IEEE Signal Process. Mag. 24:, 79\u201389 (2007).","journal-title":"IEEE Signal Process. Mag"},{"issue":"11","key":"637_CR3","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1109\/JSAC.2013.131134","volume":"31","author":"NH Tran","year":"2013","unstructured":"NH Tran, CS Hong, Z Han, S Lee, Optimal pricing effect on equilibrium behaviors of delay-sensitive users in cognitive radio networks. Selected Areas in Commun. IEEE J. 31(11), 2566\u20132579 (2013).","journal-title":"Selected Areas in Commun. IEEE J"},{"issue":"5","key":"637_CR4","doi-asserted-by":"publisher","first-page":"2574","DOI":"10.1109\/TWC.2014.031914.131363","volume":"13","author":"CT Do","year":"2014","unstructured":"CT Do, NH Tran, Z Han, LB Le, S Lee, CS Hong, Optimal pricing for duopoly in cognitive radio networks: cooperate or not cooperate?Wireless Commun. IEEE Trans. 13(5), 2574\u20132587 (2014).","journal-title":"Wireless Commun. IEEE Trans"},{"key":"637_CR5","unstructured":"S Lee, H Choi, CK Kim, in 9th International Symposium on Communications and Information Technology (ISCIT 2009), 9. A game-theoretic analysis of spectrum sharing in cognitive radio networks, (2009), pp. 415\u2013416."},{"key":"637_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5121\/ijngn.2011.3402","volume":"3","author":"A Garhwal","year":"2011","unstructured":"A Garhwal, PP Bhattacharya, A study on dynamic spectrum access techniques for cognitive radio. Intl. J. Next-Generation Netw. (IJNGN). 3:, 15\u201332 (2011).","journal-title":"Intl. J. Next-Generation Netw. (IJNGN)"},{"key":"637_CR7","doi-asserted-by":"publisher","first-page":"3832","DOI":"10.1016\/j.comnet.2011.07.022","volume":"55","author":"J Elias","year":"2011","unstructured":"J Elias, F Martignon, A Capone, E Altman, Non-cooperative spectrum access in cognitive radio networks: a game theoretical model. Comput. Netw. 55:, 3832\u20133846 (2011).","journal-title":"Comput. Netw"},{"key":"637_CR8","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TWC.2011.030411.101220","volume":"10","author":"H Li","year":"2011","unstructured":"H Li, Z Han, Socially optimal queuing control in CR networks subject to service interruptions: to queue or not to queue?IEEE Trans. Wireless Commun. 10:, 1656\u20131666 (2011).","journal-title":"IEEE Trans. Wireless Commun"},{"key":"637_CR9","doi-asserted-by":"publisher","first-page":"1944","DOI":"10.1109\/LCOMM.2012.111412.120830","volume":"16","author":"CT Do","year":"2012","unstructured":"CT Do, NH Tran, M Van Nguyen, S Lee, Social optimization strategy in unobserved queueing systems in cognitive radio networks. IEEE Commun. Lett. 16:, 1944\u20131947 (2012).","journal-title":"IEEE Commun. Lett"},{"key":"637_CR10","doi-asserted-by":"publisher","first-page":"2251","DOI":"10.1109\/JSAC.2012.121217","volume":"30","author":"K Jagannathan","year":"2012","unstructured":"K Jagannathan, I Menache, E Modiano, G Zussman, Non-cooperative spectrum access-the dedicated vs. free spectrum choice. IEEE J. Selected Areas Commun. 30:, 2251\u20132261 (2012).","journal-title":"IEEE J. Selected Areas Commun"},{"key":"637_CR11","doi-asserted-by":"publisher","unstructured":"J Wang, W Li, Non-cooperative and cooperative joining strategies in cognitive radio networks with random access. IEEE Trans. Veh. Technol. doi:\n                    10.1109\/TVT.2015.2470115\n                    \n                  .","DOI":"10.1109\/TVT.2015.2470115"},{"issue":"3","key":"637_CR12","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TWC.2009.080763","volume":"8","author":"AT Hoang","year":"2009","unstructured":"AT Hoang, Y-C Liang, DTC Wong, Y Zeng, R Zhang, Opportunistic spectrum access for energy-constrained cognitive radios, IEEE Trans. Wireless Commun. 8(3), 1206\u20131211 (2009).","journal-title":"Wireless Commun"},{"key":"637_CR13","unstructured":"I Suliman, J Lehtomaki, T Braysy, K Umebayashi, in Proc. IEEE Personal Indoor and Mobile Radio Communications. Analysis of cognitive radio networks with imperfect sensing, (2009), pp. 1616\u20131620."},{"key":"637_CR14","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1016\/j.comnet.2010.04.005","volume":"54","author":"X Gelabert","year":"2010","unstructured":"X Gelabert, O Sallent, JP Romero, R Agusti, Spectrum sharing in cognitive radio networks with imperfect sensing: a discrete-time Markov model. Comput. Netw. 54:, 2519\u20132536 (2010).","journal-title":"Comput. Netw"},{"key":"637_CR15","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/T-WC.2008.080213","volume":"8","author":"S Tang","year":"2009","unstructured":"S Tang, BL Mark, Modeling and analysis of opportunistic spectrum sharing with unreliable spectrum sensing. IEEE Trans. Wireless Commun. 8:, 1934\u20131943 (2009).","journal-title":"IEEE Trans. Wireless Commun"},{"key":"637_CR16","first-page":"952","volume":"2013","author":"T Ngatched","year":"2013","unstructured":"T Ngatched, S Dong, AS Alfa, Analysis of cognitive radio networks with channel assembling, buffering, and imperfect sensing. Wireless Commun. Netw. Conf. (WCNC). 2013:, 952\u2013957 (2013).","journal-title":"Wireless Commun. Netw. Conf. (WCNC)"},{"key":"637_CR17","unstructured":"AE Shafie, Optimal spectrum access for cognitive radios, arXiv preprint, arXiv:1208.4508 [cs.IT] (2012). \n                    http:\/\/arxiv.org\/abs\/1208.4508\n                    \n                  ."},{"key":"637_CR18","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TVT.2013.2281334","volume":"63","author":"O Altrad","year":"2014","unstructured":"O Altrad, S Muhaidat, A Al-Dweik, Opportunistic spectrum access in cognitive radio networks under imperfect spectrum sensing. IEEE Trans. Veh. Technol. 63:, 920\u2013925 (2014).","journal-title":"IEEE Trans. Veh. Technol"},{"key":"637_CR19","doi-asserted-by":"crossref","unstructured":"G Latouche, V Ramaswami, Introduction to matrix analytic methods in stochastic modeling. ASA-SIAM Series on Statistics and Applied Probability, Philadelphia, Pennsylvania (1999).","DOI":"10.1137\/1.9780898719734"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0637-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0637-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0637-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0637-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T22:12:20Z","timestamp":1589667140000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0637-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,2]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["637"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0637-x","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,6,2]]},"assertion":[{"value":"30 December 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"141"}}