2015
DOI: 10.1109/msp.2014.2338894
|View full text |Cite
|
Sign up to set email alerts
|

Spectrum Exploration and Exploitation for Cognitive Radio: Recent Advances

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
78
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(78 citation statements)
references
References 59 publications
0
78
0
Order By: Relevance
“…[5], and became popular after FCC (Federal Communications Commission) recommended it as a promising solution for supporting dynamic spectrum access [6] . Since then, a lot of researches have been carried out [7][8][9] . Here, we focus on two CR paradigms related to HetNet: OSA (Opportunistic Spectrum Access) and CSA (Concurrent Spectrum Access).…”
Section: Crmentioning
confidence: 99%
“…[5], and became popular after FCC (Federal Communications Commission) recommended it as a promising solution for supporting dynamic spectrum access [6] . Since then, a lot of researches have been carried out [7][8][9] . Here, we focus on two CR paradigms related to HetNet: OSA (Opportunistic Spectrum Access) and CSA (Concurrent Spectrum Access).…”
Section: Crmentioning
confidence: 99%
“…Distributed cooperative spectrum sensing is a well-researched area in the literature of wireless sensor networks (WSNs) [1], [15][16][17][18][19]. We can adopt such detection strategy in the context of CR networks.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…particularly as new wireless applications and technologies are continuously being developed [1]. The present spectrum allocation strategy worked perfectly in the past since it provided an optimum solution by reducing interference between active wireless users.…”
Section: Introductionmentioning
confidence: 96%
“…DSA seeks a more efficient usage of the available spectrum by allowing access of unlicensed (secondary) users while limiting interference to licensed (primary) users. This requires secondary users to have spectrum sensing capabilities [1] as well as access policies [15] for exploiting spectrum holes. Important effects such as large/small-scale fading, the hidden node problem, noise uncertainty, low SNR operation, etc., appear in the design and analysis of suitable detection schemes, and may be tackled, albeit with different effectivity, via cooperative detection (with limited data exchanges between sensors) and multiantenna detection (with centralized access to all data samples).…”
Section: Introductionmentioning
confidence: 99%