N. Sornin, M. Luis, T. Eirich, and A. L. Beylot, LoRaWAN specification, technical report, 2015.

W. Jouini, D. Ernst, C. Moy, and J. Palicot, Upper Confidence Bound Based Decision Making Strategies and Dynamic Spectrum Access, IEEE ICC, International Conference on Communications, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00489331

C. Moy, Reinforcement Learning Real Experiments for Opportunistic Spectrum Access, Karlsruhe Workshop on Software Radio, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00994975

L. Besson, R. Bonnefoi, and C. Moy, MALIN: Multi-Armed bandit Learning for Iot Networks with GRC: A TestBed Implementation and Demonstration that Learning Helps, 2018.

P. Auer, N. Cesa-bianchi, and P. Fischer, Finite-time analysis of the multiarmed bandit problem, Machine Learning, vol.47, 2002.

R. Bonnefoi, L. Besson, C. Moy, E. Kaufman, and J. Palicot, MultiArmed Bandit Learning in IoT Networks: Learning helps even in nonstationary settings, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575419

A. Anandkumar, N. Michael, A. K. Tang, and A. Swami, Distributed algorithms for learning and cognitive medium access with logarithmic regret, IEEE J. Sel. Areas Commun., v, vol.29, issue.4, 2011.

W. R. Thompson, On the likelihood that one unknown probability exceeds another in view of the evidence of two samples, Biometrika, vol.25, 1933.

H. Robbins, Some aspects of the sequential design of experiments, Bulletin of the American Mathematical Society, vol.58, issue.5, pp.527-535, 1952.

T. L. Lai and H. Robbins, Asymptotically efficient adaptive allocation rules, Advances in Applied Mathematics, vol.6, issue.1, pp.4-22, 1985.

S. Bubeck and N. Cesa-bianchi, Regret analysis of Stochastic and Non-Stochastic Multi-Armed Bandit Problems, Foundations and Trends® in Machine Learning, vol.5, pp.1-122, 2012.

S. Agrawal and N. Goyal, Analysis of Thompson sampling for the Multi-Armed Bandit problem, JMLR, Conference On Learning Theory, 2012.

E. Kaufmann, N. Korda, and R. Munos, Thompson Sampling: an Asymptotically Optimal Finite-Time Analysis, pp.199-213, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00830033

V. Toldov, L. Clavier, V. Loscrí, and N. Mitton, A Thompson Sampling approach to channel exploration-exploitation problem in multihop cognitive radio networks, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01355002

A. Maskooki, V. Toldov, L. Clavier, V. Loscrí, and N. Mitton, Competition: Channel Exploration/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01249135

C. Moy, J. Palicot, and S. J. Darak, Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks, EAI Endorsed Transactions on Cognitive Communications, vol.2, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01458815

L. Besson, SMPyBandits: an Open-Source Research Framework for Single and Multi-Players Multi-Arms Bandits (MAB) Algorithms in Python

C. Moy, IoTligent: First World-Wide Implementation of Decentralized Spectrum Learning for IoT Wireless Networks, URSI AP-RASC, pp.9-14, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02093350