2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications 2009
DOI: 10.1109/pimrc.2009.5450079
|View full text |Cite
|
Sign up to set email alerts
|

Towards dynamic spectrum access in primary OFDMA systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…1]) or exploring practical OSA scenarios (see [7,Fig. 2] in the context of secondary utilization of GSM spectrum or [20] in the context of secondary IEEE 802.16 resources usage). Our model can be generalized to the case where PU slots are offset in time from SU slots, however, it would require additional analysis of optimal channel access policies, see for example [21], [22], which is beyond the scope of this paper.…”
Section: Microscopic Modelmentioning
confidence: 99%
“…1]) or exploring practical OSA scenarios (see [7,Fig. 2] in the context of secondary utilization of GSM spectrum or [20] in the context of secondary IEEE 802.16 resources usage). Our model can be generalized to the case where PU slots are offset in time from SU slots, however, it would require additional analysis of optimal channel access policies, see for example [21], [22], which is beyond the scope of this paper.…”
Section: Microscopic Modelmentioning
confidence: 99%
“…For example, during low traffic periods (e.g. during the night), the OFDMA network could be underused for the actual needs resulting in a lower resource occupancy . The aim of this paper is to design a proper MAC technique able to exploit these holes for setting up an independent (secondary) M2M network.…”
Section: System Scenariomentioning
confidence: 99%
“…In the following, we will consider that there are N devices and that the primary network has a percentage p of free resources within each frame. Indeed, it has been shown that, even if depending on the type of data carried on primary OFDMA networks, there is a certain amount of data that remains free within the framing structure . In Table , the parameters used for the protocol analysis are summarised.…”
Section: The Data Aided Cognitive Machine To Machine Medium Access Comentioning
confidence: 99%
See 1 more Smart Citation
“…1]) or exploring practical OSA scenarios (see [28,Fig. 2] in the context of secondary utilization of GSM spectrum or [29] in the context of secondary IEEE 802.16 resources usage). Our model can be generalized to the case where PU slots are offset in time from SU slots, however it would require additional analysis of optimal channel access policies, see for example [26], [30], [31], which is beyond the scope of this paper.…”
Section: System Modelmentioning
confidence: 99%