{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T07:56:07Z","timestamp":1704441367216},"reference-count":17,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2011,11,3]],"date-time":"2011-11-03T00:00:00Z","timestamp":1320278400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2012,8,10]]},"abstract":"<jats:title>SUMMARY<\/jats:title><jats:p>In an opportunistic spectrum sharing system, secondary users (SUs) opportunistically access the white space spectrum that is not occupied by the primary user (PU). Some analytical performance models have been available based on Markov chain modeling. In these models, SUs and PUs access the spectrum by randomly selecting the available channels with equal probability. However, how SUs and PUs use the spectrum are controlled by the access strategy designed in their MAC layer in an ad\u2010hoc network or centralized radio resource management layer in an infrastructure\u2010based network. To analyze the grade of service (GoS) of the secondary system under consideration for the access strategy, we propose an access rule transition matrix to model the access behavior of radio resource management, and apply it into the continuous\u2010time Markov chain model. It was proved that the proposed model is equivalent to the original models assuming the random access strategy by simulation. Moreover, we analyzed the GoS performance of the secondary system by assuming an ordered hunt access strategy. The results showed that the GoS performance of secondary systems can be improved greatly if it knows the spectrum access strategy of the primary system. Copyright \u00a9 2011 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/cpe.1890","type":"journal-article","created":{"date-parts":[[2011,11,3]],"date-time":"2011-11-03T08:01:17Z","timestamp":1320307277000},"page":"1200-1212","source":"Crossref","is-referenced-by-count":5,"title":["An analytical performance model considering access strategy of an opportunistic spectrum sharing system"],"prefix":"10.1002","volume":"24","author":[{"given":"Wanbin","family":"Tang","sequence":"first","affiliation":[{"name":"National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China  Chengdu 611731 China"}]},{"given":"Huogen","family":"Yu","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China  Chengdu 611731 China"}]},{"given":"Yanfeng","family":"Han","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China  Chengdu 611731 China"}]},{"given":"Shaoqian","family":"Li","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China  Chengdu 611731 China"}]}],"member":"311","published-online":{"date-parts":[[2011,11,3]]},"reference":[{"key":"e_1_2_8_2_1","unstructured":"Federal Communications Commission.Notice of proposed rule making: Unlicensed operation in the TV broadcast bands.ET Docket No. 04\u2010186(FCC 04\u2010133) 2004."},{"key":"e_1_2_8_3_1","unstructured":"Federal Communications Commission.Notice of proposed rule making and order Faciliating opportunities for flexible efficient and reliable spectrum use employing cognitive radio technologies.ET Docket No. 03\u2010108 2005."},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"e_1_2_8_6_1","doi-asserted-by":"crossref","unstructured":"DevroyeN VuM TarokhV.Cognitive radio networks IEEE Signal Processing Magazine 2008;12\u201323.","DOI":"10.1109\/MSP.2008.929286"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E93.B.1426"},{"key":"e_1_2_8_8_1","doi-asserted-by":"crossref","unstructured":"KannappaSM SaquibM.Performance Analysis of a Cognitive Network with Dynamic Spectrum Assignment to Secondary Users.Proceedings of the 2010 IEEE International Conference on Communications (ICC) Cape Town Western Cape 2010;1\u20135.","DOI":"10.1109\/ICC.2010.5502743"},{"key":"e_1_2_8_9_1","doi-asserted-by":"crossref","unstructured":"IshibashiB BouabdallahN BoutabaR.QoS performance analysis of cognitive radio\u2010based virtual wireless networks.Proceedings of the IEEE 27th Conference on Computer Communications (INFOCOM 2008) Phoenix AZ America 2008;2423\u20132427.","DOI":"10.1109\/INFOCOM.2008.312"},{"key":"e_1_2_8_10_1","doi-asserted-by":"crossref","unstructured":"TangS MarkBL.An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment.Proceedings of the IEEE Wireless Communications and Networking Conference WCNC 2008 Las Vegas NV USA 2008;2681\u20132686.","DOI":"10.1109\/WCNC.2008.470"},{"key":"e_1_2_8_11_1","doi-asserted-by":"crossref","unstructured":"TangS MarkBL.Performance Analysis of a Wireless Network with Opportunistic Spectrum Sharing.Proceedings of the IEEE Global Telecommunications Conference (GlobeCom\u201907) Washington DC America 2007;4636\u20134640.","DOI":"10.1109\/GLOCOM.2007.880"},{"key":"e_1_2_8_12_1","doi-asserted-by":"crossref","unstructured":"AnC JiH SiP.Dynamic Spectrum Access with QoS Provisioning in Cognitive Radio Networks.Proceedings of the 2010 IEEE Global Telecommunications Conference (GlobeCom\u201910) Miami FL 2010;111\u2013115.","DOI":"10.1109\/GLOCOM.2010.5683939"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2064794"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E94.B.1621"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E94.B.1265"},{"key":"e_1_2_8_16_1","doi-asserted-by":"crossref","unstructured":"GunawardenaS ZhuangW.Voice Capacity of Cognitive Radio Networks for Both Centralized and Distributed Channel Access Control.Proceedings of the 2010 IEEE Global Telecommunications Conference (GobalCom\u201910) Miami FL 2010;1\u20135.","DOI":"10.1109\/GLOCOM.2010.5683073"},{"key":"e_1_2_8_17_1","doi-asserted-by":"crossref","unstructured":"GunawardenaS ZhuangW.Voice Capacity of Cognitive Radio Networks.Proceedings of the 2010 IEEE International Conference on Communications (ICC) Cape Town Western Cape 2010;12\u201316.","DOI":"10.1109\/ICC.2010.5502635"},{"key":"e_1_2_8_18_1","volume-title":"Introduction to Queueing Theory","author":"Cooper RB","year":"1981"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.1890","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.1890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T01:23:50Z","timestamp":1694568230000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.1890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,3]]},"references-count":17,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2012,8,10]]}},"alternative-id":["10.1002\/cpe.1890"],"URL":"https:\/\/doi.org\/10.1002\/cpe.1890","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,3]]}}}