From: Spectrum sharing via hybrid cognitive players evaluated by an M/D/1 queuing model
A _{ i } | Total number of normal players in ith cell |
B _{ i } | Total number of players that are not vigilante in ith cell |
C | Cost function |
e _{ g } | The aggressiveness of the greedy player |
e _{ v } | The aggressiveness of the vigilante player |
i | Cell indicator |
M | Total number of players in network |
m | Total number of cells in network |
N _{ i } | Total number of players in ith cell |
n _{ p } | Number of primary players |
n _{ s } | Number of secondary players |
P _{ g } | Transmitting probability of greedy player |
P _{ n } | Transmitting probability of normal player |
P _{ v } | Transmitting probability of vigilante player |
Q _{ g } | Throughput of greedy player |
Q _{ n } | Throughput of normal player |
Q _{ v } | Throughput of vigilante player |
u _{ g } | Greedy utility function |
u _{ p } | Primary utility function |
u _{ s } | Secondary utility function |
u _{ v } | Vigilante utility function |
W _{ p } | Primary waiting time |
W _{ s } | Secondary waiting time |
α _{ p } | Share of bandwidth used by primary |
α _{ s } | Share of bandwidth used by secondary |
λ _{ p } | Packet rate for the primary |
λ _{ s } | Packet rate for the secondary |
μ | Server rate or bandwidth |