{"id":"https://openalex.org/W3203743944","doi":"https://doi.org/10.23919/wiopt52861.2021.9589243","title":"Opportunistic Spectrum Access: Does Maximizing Throughput Minimize File Transfer Time?","display_name":"Opportunistic Spectrum Access: Does Maximizing Throughput Minimize File Transfer Time?","publication_year":2021,"publication_date":"2021-10-18","ids":{"openalex":"https://openalex.org/W3203743944","doi":"https://doi.org/10.23919/wiopt52861.2021.9589243","mag":"3203743944"},"language":"en","primary_location":{"id":"doi:10.23919/wiopt52861.2021.9589243","is_oa":false,"landing_page_url":"https://doi.org/10.23919/wiopt52861.2021.9589243","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 19th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2109.11624","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016316653","display_name":"Jie Hu","orcid":"https://orcid.org/0000-0002-0165-3738"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jie Hu","raw_affiliation_strings":["North Carolina State University, Raleigh, NC"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005191124","display_name":"Vishwaraj Doshi","orcid":"https://orcid.org/0000-0003-4319-2332"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vishwaraj Doshi","raw_affiliation_strings":["Operations Research Graduate Program, North Carolina State University, Raleigh, NC"],"affiliations":[{"raw_affiliation_string":"Operations Research Graduate Program, North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050655327","display_name":"Do Young Eun","orcid":"https://orcid.org/0000-0002-1743-7482"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Do Young Eun","raw_affiliation_strings":["North Carolina State University, Raleigh, NC"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016316653"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.1593,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53337676,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8590250015258789},{"id":"https://openalex.org/keywords/file-transfer","display_name":"File transfer","score":0.7771368622779846},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.6906273365020752},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5821182727813721},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5712773203849792},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.54143226146698},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5164709091186523},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5105024576187134},{"id":"https://openalex.org/keywords/regret","display_name":"Regret","score":0.5004653930664062},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.451789915561676},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.362906813621521},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.18294769525527954},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.13376447558403015}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8590250015258789},{"id":"https://openalex.org/C2776162994","wikidata":"https://www.wikidata.org/wiki/Q534400","display_name":"File transfer","level":3,"score":0.7771368622779846},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.6906273365020752},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5821182727813721},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5712773203849792},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.54143226146698},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5164709091186523},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5105024576187134},{"id":"https://openalex.org/C50817715","wikidata":"https://www.wikidata.org/wiki/Q79895177","display_name":"Regret","level":2,"score":0.5004653930664062},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.451789915561676},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.362906813621521},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.18294769525527954},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.13376447558403015},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/wiopt52861.2021.9589243","is_oa":false,"landing_page_url":"https://doi.org/10.23919/wiopt52861.2021.9589243","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 19th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2109.11624","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.11624","pdf_url":"https://arxiv.org/pdf/2109.11624","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2109.11624","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.11624","pdf_url":"https://arxiv.org/pdf/2109.11624","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W35251828","https://openalex.org/W1972921453","https://openalex.org/W1993602208","https://openalex.org/W2050466752","https://openalex.org/W2066546615","https://openalex.org/W2093562354","https://openalex.org/W2108890528","https://openalex.org/W2120125372","https://openalex.org/W2130172960","https://openalex.org/W2141515329","https://openalex.org/W2142819538","https://openalex.org/W2146025745","https://openalex.org/W2165511051","https://openalex.org/W2168000232","https://openalex.org/W2628758503","https://openalex.org/W2751353504","https://openalex.org/W2791444538","https://openalex.org/W2919158374","https://openalex.org/W2957391352","https://openalex.org/W2962855623","https://openalex.org/W2963554715","https://openalex.org/W2964276712","https://openalex.org/W2964990165","https://openalex.org/W2981252175","https://openalex.org/W2981650424","https://openalex.org/W2990470364","https://openalex.org/W4289125818","https://openalex.org/W6601392155","https://openalex.org/W6676052601","https://openalex.org/W6681805987","https://openalex.org/W6757029329","https://openalex.org/W6769870811"],"related_works":["https://openalex.org/W2971351794","https://openalex.org/W3046761854","https://openalex.org/W2084675319","https://openalex.org/W3037412205","https://openalex.org/W2001002674","https://openalex.org/W2561157175","https://openalex.org/W2000993155","https://openalex.org/W2884707029","https://openalex.org/W2915501980","https://openalex.org/W2991656725"],"abstract_inverted_index":{"The":[0],"Opportunistic":[1],"Spectrum":[2],"Access":[3],"(OSA)":[4],"model":[5],"has":[6],"been":[7],"developed":[8],"for":[9,22,36,70,116,186],"the":[10,16,42,46,80,93,117,132,139,151,167,183],"secondary":[11],"users":[12],"(SUs)":[13],"to":[14,31,40,122,131,173],"exploit":[15],"stochastic":[17,133],"dynamics":[18],"of":[19,97,102,108,141],"licensed":[20],"channels":[21],"file":[23,52,94,100,128],"transfer":[24,53,95,129],"in":[25,67,105],"an":[26,171],"opportunistic":[27],"manner.":[28],"Common":[29],"approaches":[30],"design":[32],"channel":[33,82,178],"sensing":[34],"strategies":[35],"throughput-oriented":[37],"applications":[38],"tend":[39],"maximize":[41],"long-term":[43,155],"throughput,":[44],"with":[45,176],"hope":[47],"that":[48,62,77,153,163,195],"it":[49],"provides":[50],"reduced":[51],"time":[54,96],"as":[55],"well.":[56],"In":[57],"this":[58,63],"paper,":[59],"we":[60],"show":[61],"is":[64],"not":[65],"correct":[66],"general,":[68],"especially":[69],"small":[71],"files.":[72],"Unlike":[73],"prior":[74],"delay-related":[75],"works":[76],"seldom":[78],"consider":[79],"heterogeneous":[81,109],"rate":[83],"and":[84,120,146,170,180],"bursty":[85],"incoming":[86],"packets,":[87],"our":[88,127,142,187,197],"work":[89],"explicitly":[90],"considers":[91],"minimizing":[92],"a":[98,106,113,160],"single":[99],"consisting":[101],"multiple":[103],"packets":[104],"set":[107],"channels.":[110],"We":[111,137,157,190],"formulate":[112],"mathematical":[114],"framework":[115],"static":[118,144],"policy,":[119],"extend":[121],"dynamic":[123,147],"policy":[124,152,162],"by":[125],"mapping":[126],"problem":[130],"shortest":[134],"path":[135],"problem.":[136],"analyze":[138],"performance":[140],"proposed":[143],"optimal":[145,148],"policies":[149],"over":[150],"maximizes":[154],"throughput.":[156],"then":[158],"propose":[159],"heuristic":[161],"takes":[164],"into":[165],"account":[166],"performance-complexity":[168],"tradeoff":[169],"extension":[172],"online":[174,188],"implementation":[175],"unknown":[177],"parameters,":[179],"also":[181,191],"present":[182,192],"regret":[184],"bound":[185],"algorithm.":[189],"numerical":[193],"simulations":[194],"reflect":[196],"analytical":[198],"results.":[199]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
