J. Lunden, V. Koivunen, and H. V. Poor, Spectrum Exploration and Exploitation for Cognitive Radio: Recent Advances, IEEE Signal Processing Magazine, vol.32, issue.3, pp.123-140, 2015.
DOI : 10.1109/MSP.2014.2338894

O. Chapelle and L. Li, An empirical evaluation of thompson sampling, Advances in neural information processing systems, 2011.

Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework, IEEE Journal on Selected Areas in Communications, vol.25, issue.3, 2007.
DOI : 10.1109/JSAC.2007.070409

S. Geirhofer, L. Tong, and B. M. Sadler, A Measurement-Based Model for Dynamic Spectrum Access in WLAN Channels, MILCOM 2006, 2006.
DOI : 10.1109/MILCOM.2006.302405

M. López-ben?tez and F. Casadevall, Time-Dimension Models of Spectrum Usage for the Analysis, Design, and Simulation of Cognitive Radio Networks, IEEE Transactions on Vehicular Technology, vol.62, issue.5, 2013.
DOI : 10.1109/TVT.2013.2238960

W. Jouini, D. Ernst, C. Moy, and J. Palicot, Multi-armed bandit based policies for cognitive radio's decision making issues, 2009 3rd International Conference on Signals, Circuits and Systems (SCS), 2009.
DOI : 10.1109/ICSCS.2009.5412697

URL : http://orbi.ulg.ac.be/jspui/handle/2268/16757

Y. Gai, B. Krishnamachari, and R. Jain, Learning Multiuser Channel Allocations in Cognitive Radio Networks: A Combinatorial Multi-Armed Bandit Formulation, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN), 2010.
DOI : 10.1109/DYSPAN.2010.5457857

P. Auer, N. Cesa-bianchi, and P. Fischer, Finite-time analysis of the multiarmed bandit problem, Machine learning, vol.47, issue.2, 2002.

Y. Gwon, S. Dastangoo, and H. Kung, Optimizing media access strategy for competing cognitive radio networks, Global Com. Conf. (GLOBECOM), 2013.

K. Wang, L. Chen, Q. Liu, W. Wang, and F. Li, One Step Beyond Myopic Probing Policy: A Heuristic Lookahead Policy for Multi-Channel Opportunistic Access, IEEE Transactions on Wireless Communications, vol.14, issue.2, 2015.
DOI : 10.1109/TWC.2014.2359917

URL : https://hal.archives-ouvertes.fr/hal-01110564

T. L. Lai and H. Robbins, Asymptotically efficient adaptive allocation rules, Advances in Applied Mathematics, vol.6, issue.1, pp.4-22, 1985.
DOI : 10.1016/0196-8858(85)90002-8

URL : http://doi.org/10.1016/0196-8858(85)90002-8

L. Lai, H. Gamal, H. Jiang, and H. V. Poor, Cognitive medium access: Exploration, exploitation, and competition, Mobile Computing IEEE Transactions on, vol.10, issue.2, pp.239-253, 2011.

P. Diaconis and D. Ylvisaker, Conjugate Priors for Exponential Families, The Annals of statistics, pp.269-281, 1979.
DOI : 10.1214/aos/1176344611

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Botta, A. Dainotti, and A. Pescapè, A tool for the generation of realistic network workload for emerging networking scenarios, Computer Networks, vol.56, issue.15, pp.3531-3547, 2012.
DOI : 10.1016/j.comnet.2012.02.019

K. Thompson, G. J. Miller, and R. Wilder, Wide-area Internet traffic patterns and characteristics, IEEE Network, vol.11, issue.6, 1997.
DOI : 10.1109/65.642356

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Maskooki, V. Toldov, L. Clavier, V. Loscrí, and N. Mitton, Competition: Channel Exploration/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment, Int. C. on Embedded Wireless Systems and Networks (EWSN), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01249135