Mobile data offloading is a promising approach to alleviate network congestion and enhance quality of service (QoS) in mobile cellular networks. In this paper, we investigate …
X Xing, T Jing, Y Huo, H Li… - 2013 Proceedings IEEE …, 2013 - ieeexplore.ieee.org
The problem of channel quality prediction in cognitive radio networks is investigated in this paper. First, the spectrum sensing process is modeled as a Non-Stationary Hidden Markov …
L Gao, J Huang, YJ Chen… - IEEE Journal on Selected …, 2013 - ieeexplore.ieee.org
Providing proper economic incentives to all parties involved is essential for the success of dynamic spectrum access. Market-driven secondary spectrum trading is an effective way to …
Z Hasan, VK Bhargava - IEEE Transactions on Wireless …, 2013 - ieeexplore.ieee.org
User cooperation although improves performance of wireless systems, it requires incentives for the potential cooperating nodes to spend their energy acting as relays. Moreover, these …
M Khaledi, AA Abouzeid - 2013 Information Theory and …, 2013 - ieeexplore.ieee.org
Cognitive radio is a novel communication paradigm that can significantly improve spectrum utilization by allowing the cognitive radio users to dynamically utilize the licensed spectrum …
Spectrum trading creates more accessing opportunities for secondary users (SUs) and economically benefits the primary users (PUs). However, it is challenging to implement …
SP Sheng, M Liu - IEEE/ACM Transactions on Networking, 2013 - ieeexplore.ieee.org
In this paper, we formulate a contract design problem where a primary license holder wishes to profit from its excess spectrum capacity by selling it to potential secondary users/buyers. It …
M Li, P Li, M Pan, J Sun - 2013 Proceedings IEEE INFOCOM, 2013 - ieeexplore.ieee.org
The rapid growth of wireless devices and services exacerbates the problem of spectrum scarcity in wireless networks. Recently, spectrum auction has emerged as one of the most …
In cognitive radio networks, the main objective of spectrum sensing is to exploit spectrum holes left by the primary users (PUs). Different PUs' traffic patterns might provide different …