Spectrum Exploration and Exploitation for Cognitive Radio: Recent Advances, IEEE Signal Processing Magazine, vol.32, issue.3, pp.123-140, 2015. ,
DOI : 10.1109/MSP.2014.2338894
An empirical evaluation of thompson sampling, Advances in neural information processing systems, 2011. ,
Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework, IEEE Journal on Selected Areas in Communications, vol.25, issue.3, 2007. ,
DOI : 10.1109/JSAC.2007.070409
A Measurement-Based Model for Dynamic Spectrum Access in WLAN Channels, MILCOM 2006, 2006. ,
DOI : 10.1109/MILCOM.2006.302405
Time-Dimension Models of Spectrum Usage for the Analysis, Design, and Simulation of Cognitive Radio Networks, IEEE Transactions on Vehicular Technology, vol.62, issue.5, 2013. ,
DOI : 10.1109/TVT.2013.2238960
Multi-armed bandit based policies for cognitive radio's decision making issues, 2009 3rd International Conference on Signals, Circuits and Systems (SCS), 2009. ,
DOI : 10.1109/ICSCS.2009.5412697
URL : http://orbi.ulg.ac.be/jspui/handle/2268/16757
Learning Multiuser Channel Allocations in Cognitive Radio Networks: A Combinatorial Multi-Armed Bandit Formulation, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN), 2010. ,
DOI : 10.1109/DYSPAN.2010.5457857
Finite-time analysis of the multiarmed bandit problem, Machine learning, vol.47, issue.2, 2002. ,
Optimizing media access strategy for competing cognitive radio networks, Global Com. Conf. (GLOBECOM), 2013. ,
One Step Beyond Myopic Probing Policy: A Heuristic Lookahead Policy for Multi-Channel Opportunistic Access, IEEE Transactions on Wireless Communications, vol.14, issue.2, 2015. ,
DOI : 10.1109/TWC.2014.2359917
URL : https://hal.archives-ouvertes.fr/hal-01110564
Asymptotically efficient adaptive allocation rules, Advances in Applied Mathematics, vol.6, issue.1, pp.4-22, 1985. ,
DOI : 10.1016/0196-8858(85)90002-8
URL : http://doi.org/10.1016/0196-8858(85)90002-8
Cognitive medium access: Exploration, exploitation, and competition, Mobile Computing IEEE Transactions on, vol.10, issue.2, pp.239-253, 2011. ,
Conjugate Priors for Exponential Families, The Annals of statistics, pp.269-281, 1979. ,
DOI : 10.1214/aos/1176344611
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.334.5835
A tool for the generation of realistic network workload for emerging networking scenarios, Computer Networks, vol.56, issue.15, pp.3531-3547, 2012. ,
DOI : 10.1016/j.comnet.2012.02.019
Wide-area Internet traffic patterns and characteristics, IEEE Network, vol.11, issue.6, 1997. ,
DOI : 10.1109/65.642356
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.65
Competition: Channel Exploration/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment, Int. C. on Embedded Wireless Systems and Networks (EWSN), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01249135