{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:58:24Z","timestamp":1723017504259},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T00:00:00Z","timestamp":1296518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1109\/jsac.2011.110219","type":"journal-article","created":{"date-parts":[[2011,1,24]],"date-time":"2011-01-24T21:08:08Z","timestamp":1295903288000},"page":"480-493","source":"Crossref","is-referenced-by-count":254,"title":["Cognitive Network Interference"],"prefix":"10.1109","volume":"29","author":[{"given":"A","family":"Rabbachin","sequence":"first","affiliation":[]},{"given":"T Q S","family":"Quek","sequence":"additional","affiliation":[]},{"family":"Hyundong Shin","sequence":"additional","affiliation":[]},{"given":"M Z","family":"Win","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.806591"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020321501945"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056296"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1978.1094043"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054756"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/j.0022-2720.2005.01439.x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/25.917918"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/26.664307"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/18.165447"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094916"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1016712"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4623708"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/25.260747"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.2307\/2332598"},{"key":"ref28","author":"heath","year":"2004","journal-title":"Applications of the Poisson model to wireless telephony and to cosmology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.15.1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/2288030"},{"key":"ref2","article-title":"NSF Spectrum Occupancy Measurements Project Summary","author":"mchenry","year":"2005"},{"key":"ref1","article-title":"Policy task force report (et docket-135)","year":"2002"},{"key":"ref20","article-title":"Private conversation","author":"shepp","year":"2001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.07.071283"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.07.060438"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/JSAC.2009.090922","article-title":"A stochastic geometry approach to coexistence in heterogeneous wireless networks","volume":"27","author":"pinto","year":"2009","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.080203"},{"key":"ref26","author":"kingman","year":"1993","journal-title":"Poisson Processes"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4407224"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025543"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090908"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1086\/338705"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4594936"},{"key":"ref57","author":"samoradnitsky","year":"1994","journal-title":"Stable Non-Gaussian Random Processes"},{"key":"ref56","article-title":"Technical requirements for UWB DAA (detect and avoid) devices to ensure the protection of radiolocation services in the bands 3.1 ? 3.4 GHz and 8.5 ? 9 GHz and BWA terminals in the band 3.4 ? 4.2 GHz","year":"2008"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.72"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080118"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070409"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.070475"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/7.256287"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2007.914879"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2003.810833"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2015710"},{"key":"ref13","article-title":"A mathematical model for network interference","author":"win","year":"2007","journal-title":"IEEE Commun Theory Workshop"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.2008764"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/4234.660796"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/26.843135"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.805030"},{"key":"ref18","article-title":"Private conversation","author":"scholtz","year":"1997"},{"key":"ref19","article-title":"Private conversation","author":"winters","year":"2001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"ref3","article-title":"Notice of proposed rule making, in the matter of facilitating opportunities for flexible, efficient and reliable spectrum use employing cognitive radio technologies (et docket no. 03'108) and authorization and use of software defined radios (et docket no. 00'47), FCC 03'322","year":"2003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.361604"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481338"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2015717"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090906"},{"key":"ref9","first-page":"772","author":"cabric","year":"2004","journal-title":"Proc IEEE Asilomar Conf on Signals Systems and Computers"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070155"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2007.914897"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2003960"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090923"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.845546"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858939"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.04598"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874537"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/49\/5701679\/05701700.pdf?arnumber=5701700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:29:22Z","timestamp":1638217762000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5701700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":63,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2011.110219","relation":{},"ISSN":["0733-8716"],"issn-type":[{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2011,2]]}}}