U. Raza, P. Kulkarni, and M. Sooriyabandara, Low power wide area networks: An overview, IEEE Communications Surveys Tutorials, vol.19, issue.2, pp.855-873, 2017.

J. Mitola and G. Q. Maguire, Cognitive Radio: making software radios more personal, IEEE Personal Communications, vol.6, pp.13-18, 1999.

S. Haykin, Cognitive Radio: Brain-Empowered Wireless Communications, IEEE Journal on Selected Areas in Communications, vol.23, issue.2, pp.201-220, 2005.

P. Auer, N. Cesa-bianchi, and P. Fischer, Finite-time Analysis of the Multi-armed Bandit Problem, Machine Learning, vol.47, pp.235-256, 2002.

P. Auer, N. Cesa-bianchi, Y. Freund, and R. E. Schapire, The NonStochastic Multi-Armed Bandit Problem, SIAM Journal on Computing, vol.32, issue.1, pp.48-77, 2002.

S. Bubeck and N. Cesa-bianchi, Regret analysis of stochastic and nonstochastic multi-armed bandit problems, Foundations and Trends® in Machine Learning, vol.5, pp.1-122, 2012.

R. Bonnefoi, C. Moy, and J. Palicot, Improvement of the LPWAN AMI backhaul's latency thanks to reinforcement learning algorithms, EURASIP Journal on Wireless Communications and Networking, vol.2018, issue.1, p.34, 2018.

A. Azari and C. Cavdar, Self-organized Low-power IoT Networks: A Distributed Learning Approach, IEEE Globecom?, 2018.

R. Bonnefoi, L. Besson, C. Moy, E. Kaufmann, and J. Palicot, MultiArmed Bandit Learning in IoT Networks: Learning helps even in nonstationary settings, 12th EAI Conference on Cognitive Radio Oriented Wireless Network and Communication, CROWNCOM Proceedings, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575419

W. R. Thompson, On the likelihood that one unknown probability exceeds another in view of the evidence of two samples, Biometrika, vol.25, issue.3/4, pp.285-294, 1933.

L. Besson and E. Kaufmann, Multi-Player Bandits Revisited, Mehryar Mohri and Karthik Sridharan, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01629733

E. Boursier and V. Perchet, SIC-MMAB: Synchronisation Involves Communication in Multiplayer Multi-Armed Bandits, 2018.

R. Kumar, S. J. Darak, A. Yadav, A. K. Sharma, and R. K. Tripathi, Two-stage decision making policy for opportunistic spectrum access and validation on USRP testbed, Wireless Networks, pp.1-15, 2016.

R. Kumar, S. J. Darak, A. Yadav, A. K. Sharma, and R. K. Tripathi, Channel Selection for Secondary Users in Decentralized Network of Unknown Size, IEEE Communications Letters, vol.21, issue.10, pp.2186-2189, 2017.

A. Maskooki, V. Toldov, L. Clavier, V. Loscrí, and N. Mitton, Competition: Channel Exploration/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment, EWSN-International Conference on Embedded Wireless Systems and Networks (dependability competition), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01249135

V. Toldov, L. Clavier, V. Loscrí, and N. Mitton, A Thompson Sampling Approach To Channel Exploration Exploitation Problem In Multihop Cognitive Radio Networks, PIMRC, pp.1-6, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01355002

L. G. Roberts, Aloha packet system with and without slots and capture, SIGCOMM Comput. Commun. Rev, vol.5, pp.28-42, 1975.

J. R. Norris, of Cambridge Series in Statistical and Probabilistic Mathematics, vol.2, 1998.

X. Yang, A. Fapojuwo, and E. Egbogah, Performance analysis and parameter optimization of random access backoff algorithm in lte, 2012 IEEE Vehicular Technology Conference (VTC Fall), pp.1-5, 2012.

J. Audibert, R. Munos, and C. Szepesvári, Tuning bandit algorithms in stochastic environments, International Conference on Algorithmic Learning Theory, pp.150-165, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00203487

A. Garivier and E. Moulines, On upper-confidence bound policies for switching bandit problems, International Conference on Algorithmic Learning Theory, pp.174-188, 2011.

Y. Cao, W. Zheng, B. Kveton, and Y. Xie, Nearly Optimal Adaptive Procedure for Piecewise-Stationary Bandit: a Change-Point Detection Approach, AISTATS, 2019.

S. J. Darak, Spectrum Utilization and Reconfiguration Cost Comparison of Various Decision Making Policies for Opportunistic Spectrum Access Using Real Radio Signals, CROWNCOM 2016, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01451466

L. Besson, R. Bonnefoi, and C. Moy, MALIN: an Implementation of Multi-Armed Bandits Learning Schemes for Internet-of-things Networks, 2019 IEEE Wireless Communications and Networking Conference, vol.2019, 2019.