Macker J P and Corson M S. Mobile ad hoc networking andthe IETF [J]. ACM SIGMOBILE Mobile Computing andCommunications Review, 1998, 2(2): 9-14.[2]Mitola J III and Maguire G Q Jr. Cognitive radio: makingsoftware radios more personal [J]. IEEE PersonalCommunications, 1999, 6(4): 13-19.[3]Haykin S. Cognitive radio: brain-empowered wirelesscommunications [J].IEEE Selected Areas in Communications.2005, 23(2):201-220[4]So J and Vaidya N H. Multi-channel mac for ad hoc networks:handling multi-channel hidden terminals using a singletransceiver [C]. Proceedings of the 5th ACM internationalsymposium on Mobile ad hoc networking and computing,Roppongi Hills, Tokyo, Japan, May 24-26, 2004: 222-233.[5]Hsu A C C, Wei D S L, and Kuo C C J. A cognitive MACprotocol using statistical channel allocation for wirelessAd-hoc networks [C]. Wireless Communications andNetworking Conference, 2007. WCNC 2007. IEEE, HongKong, China, March 11-15, 2007: 105-110.[6]Bouckaert S, Letor N, Blondia C, Moerman I, and DemeesterP. Distributed on demand channel selection in multi channel,multi interface wireless mesh networks [C]. GlobalTelecommunications Conference, 2007. GLOBECOM07.IEEE, Washington, DC, USA, Nov. 26-30, 2007: 5086-5091.[7]LEE J W, Chiang M, and Calderbank A R. Utility-optimalmedium access control: reverse and forward engineering [C].IEEE INFOCOM, Barcelona, Spain, April 23-29, 2006: 1-13.[8]Bonald T and Massoulie L. Impact of fairness on internetperformance [C]. Proceedings of the 2001 ACMSIGMETRICS international conference on Measurement andmodeling of computer systems, Cambridge, Massachusetts,USA, June 16-20, 2001: 82-91.[9]Lin X and Shroff N B. The impact of imperfect scheduling oncross-layer rate control in multihop wireless networks [C].IEEE INFOCOM, Miami, FL, USA, Mar. 13-17, 2005:1804-1814.[10]Boyd S P and Vandenberghe L. Convex Optimization [M].Cambridge: Cambridge University Press, 2004, chapter 3,4,9.
|