[1]
J. Mitola and G.Q. Maguire. Cognitive Radio: Making Software Radio More Personal. Personal Communications, IEEE, Vol. 6, No. 4, pp.13-18, Aug. (1999).
DOI: 10.1109/98.788210
Google Scholar
[2]
S. Haykin. Cognitive Radio: Brain-Empowered Wireless Communications. IEEE Journal of Selected Areas in Communications, Vol. 23, No. 2, pp.201-220, Feb. (2005).
DOI: 10.1109/jsac.2004.839380
Google Scholar
[3]
D. Maldonado, B. Le, A. Hugine, et al. Cognitive Radio Applications to Dynamic Spectrum Allocation: A Discussion and An Illustrative Example. In Proc. IEEE DYSPAN, Baltimore, MD, pp.597-600, (2005).
DOI: 10.1109/dyspan.2005.1542677
Google Scholar
[4]
J. Mitola. Software Radio Architecture. John Wiley &Sons, (2000).
Google Scholar
[5]
T.L. Ngoc and S.V. Krishnamurthy. Performance of Combined Free/Demand Assignment Multi-Acess (CFDAMA) Protocol with Pre-Assigned Request Slots in Integrated Voice/Data Satellite Communications. IEEE International Conference on Communications, vol. 3, pp.1572-1576, Jun (1995).
DOI: 10.1109/icc.1995.524466
Google Scholar
[6]
T.L. Ngoc and I.M. Jahangir. Performance Analysis of CFDAMA-PB Protocol for Packet Satellite Communications. IEEE Transactions on Communications, pp.1206-1214, Sep. (1998).
DOI: 10.1109/26.718562
Google Scholar
[7]
P.D. Mitchell, D. Grace, T.C. Tozer. Comparative Performance of the CFDAMA protocol via Satellite with Various Terminal Request Strategies. IEEE Global Telecommunications Conference, San Antonio, USA, Vol. 4, pp.2720-2724, Nov. (2001).
DOI: 10.1109/glocom.2001.966268
Google Scholar
[8]
T.T. Ha. Digital Satellite Communications, Second Edition, McGraw-Hill, (1990).
Google Scholar
[9]
J.M. Park, E. K. P. Chong, H.J. Siegel, et al. Allocation of Qos Connections in MF-TDMA Satellite Networks: A Two-Phase Approach. IEEE Transactions on Vehicular Technology, Vol. 54, No. 1, Jan. (2005).
DOI: 10.1109/tvt.2004.838836
Google Scholar
[10]
T.A. Weiss and F.K. Jondral. Spectrum Pooling: An Innovative Strategy for the Enhancement of Spectrum Efficiency. IEEE Communications Magazine, Vol. 42, pp.8-14, Mar. (2004).
DOI: 10.1109/mcom.2004.1273768
Google Scholar
[11]
C.Y. Hu, H. Kim, and J.C. Hou. An Analysis of the Binary Exponential Backoff Algorithm in Distributed MAC Protocols. Technical Report No. UIUCDCS-R-2005-2599, July (2005).
Google Scholar
[12]
S.H. Yan, Y.N. Zhou, S.Q. Wu, et al. Priority Backoff Algorithm for IEEE802. 11 DCF. International Conference on Communications, Circuits and Networks, Vol. 1, pp.423-427, Jun. (2004).
Google Scholar