In this paper we explore the possibility of exploiting underutilized channels in the GSM bands. The secondary (unlicensed) users of the spectrum are the nodes of an overlay cognitive ad-hoc network, which opportunistically transmits in data channels left unused by the primary (licensed) system. The fundamental constraints for the secondary system are: 1) it uses the time slots/frequency channels (i.e. data channels) unused by the primary GSM system, 2) its operation does not degrade the performances of the primary system, 3) there is no exchange of signalling information between the primary and the secondary system to facilitate the secondary usage of spectrum, that is, the primary users are not cognitive aware. The focus is on the feasibil...
International audienceIn this paper, we focus on a wireless flat fading channel in a Cognitive radio...
In this paper, we examine a spectrum sharing opportunities over the existing Global System of Mobile...
In this paper, we introduce a framework encompassing the creation and the exploitation of secondary ...
It has been widely recognized that the valuable, yet finite radio spectrum is being underutilized by...
Today's networked society has an unprecedented and growing demand for wireless capacity. New technol...
In this paper, we characterize the radio frequency spectrum opportunities available in a common glob...
Cognitive radio is a new concept of reusing a licensed spectrum in an unlicensed manner. The motivat...
It has been widely recognized that the valuable, yet finite radio spec-trum is being underutilized b...
Although spectrum is usually considered a scarce resource, measurements have shown that most assigne...
The traditional approach of dealing with spectrum management in wireless communications has been the...
It is well known that electromagnetic radio spectrum is very expensive. This spectrum is managed by ...
The objective of this work is to assess some fundamental limits for opportunistic spectrum reuse via...
Groupe Spécial Mobile (GSM) has been developed as the pan-European second generation of digital mobi...
In recent years, the cognitive radio technology has attracted the attention of all the players in th...
This thesis presents methods to obtain and exploit knowledge of spectrum availability for cognitive ...
International audienceIn this paper, we focus on a wireless flat fading channel in a Cognitive radio...
In this paper, we examine a spectrum sharing opportunities over the existing Global System of Mobile...
In this paper, we introduce a framework encompassing the creation and the exploitation of secondary ...
It has been widely recognized that the valuable, yet finite radio spectrum is being underutilized by...
Today's networked society has an unprecedented and growing demand for wireless capacity. New technol...
In this paper, we characterize the radio frequency spectrum opportunities available in a common glob...
Cognitive radio is a new concept of reusing a licensed spectrum in an unlicensed manner. The motivat...
It has been widely recognized that the valuable, yet finite radio spec-trum is being underutilized b...
Although spectrum is usually considered a scarce resource, measurements have shown that most assigne...
The traditional approach of dealing with spectrum management in wireless communications has been the...
It is well known that electromagnetic radio spectrum is very expensive. This spectrum is managed by ...
The objective of this work is to assess some fundamental limits for opportunistic spectrum reuse via...
Groupe Spécial Mobile (GSM) has been developed as the pan-European second generation of digital mobi...
In recent years, the cognitive radio technology has attracted the attention of all the players in th...
This thesis presents methods to obtain and exploit knowledge of spectrum availability for cognitive ...
International audienceIn this paper, we focus on a wireless flat fading channel in a Cognitive radio...
In this paper, we examine a spectrum sharing opportunities over the existing Global System of Mobile...
In this paper, we introduce a framework encompassing the creation and the exploitation of secondary ...