Low power wide area networks: An overview, IEEE Communications Surveys Tutorials, vol.19, issue.2, pp.855-873, 2017. ,
Cognitive Radio: making software radios more personal, IEEE Personal Communications, vol.6, pp.13-18, 1999. ,
Cognitive Radio: Brain-Empowered Wireless Communications, IEEE Journal on Selected Areas in Communications, vol.23, issue.2, pp.201-220, 2005. ,
Finite-time Analysis of the Multi-armed Bandit Problem, Machine Learning, vol.47, pp.235-256, 2002. ,
The NonStochastic Multi-Armed Bandit Problem, SIAM Journal on Computing, vol.32, issue.1, pp.48-77, 2002. ,
Regret analysis of stochastic and nonstochastic multi-armed bandit problems, Foundations and Trends® in Machine Learning, vol.5, pp.1-122, 2012. ,
Improvement of the LPWAN AMI backhaul's latency thanks to reinforcement learning algorithms, EURASIP Journal on Wireless Communications and Networking, vol.2018, issue.1, p.34, 2018. ,
Self-organized Low-power IoT Networks: A Distributed Learning Approach, IEEE Globecom?, 2018. ,
MultiArmed Bandit Learning in IoT Networks: Learning helps even in nonstationary settings, 12th EAI Conference on Cognitive Radio Oriented Wireless Network and Communication, CROWNCOM Proceedings, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575419
On the likelihood that one unknown probability exceeds another in view of the evidence of two samples, Biometrika, vol.25, issue.3/4, pp.285-294, 1933. ,
Multi-Player Bandits Revisited, Mehryar Mohri and Karthik Sridharan, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01629733
SIC-MMAB: Synchronisation Involves Communication in Multiplayer Multi-Armed Bandits, 2018. ,
Two-stage decision making policy for opportunistic spectrum access and validation on USRP testbed, Wireless Networks, pp.1-15, 2016. ,
Channel Selection for Secondary Users in Decentralized Network of Unknown Size, IEEE Communications Letters, vol.21, issue.10, pp.2186-2189, 2017. ,
Competition: Channel Exploration/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment, EWSN-International Conference on Embedded Wireless Systems and Networks (dependability competition), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01249135
A Thompson Sampling Approach To Channel Exploration Exploitation Problem In Multihop Cognitive Radio Networks, PIMRC, pp.1-6, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01355002
Aloha packet system with and without slots and capture, SIGCOMM Comput. Commun. Rev, vol.5, pp.28-42, 1975. ,
, of Cambridge Series in Statistical and Probabilistic Mathematics, vol.2, 1998.
Performance analysis and parameter optimization of random access backoff algorithm in lte, 2012 IEEE Vehicular Technology Conference (VTC Fall), pp.1-5, 2012. ,
Tuning bandit algorithms in stochastic environments, International Conference on Algorithmic Learning Theory, pp.150-165, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00203487
On upper-confidence bound policies for switching bandit problems, International Conference on Algorithmic Learning Theory, pp.174-188, 2011. ,
Nearly Optimal Adaptive Procedure for Piecewise-Stationary Bandit: a Change-Point Detection Approach, AISTATS, 2019. ,
Spectrum Utilization and Reconfiguration Cost Comparison of Various Decision Making Policies for Opportunistic Spectrum Access Using Real Radio Signals, CROWNCOM 2016, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01451466
MALIN: an Implementation of Multi-Armed Bandits Learning Schemes for Internet-of-things Networks, 2019 IEEE Wireless Communications and Networking Conference, vol.2019, 2019. ,