ABSTRACT
In a cognitive radio-based opportunistic spectrum access network (CR-OSAN), sec-
ondary users hope to utilize the spectrum hole for their communications. To utilize
these spectrum holes with the required protection over primary users in the same fre-
quency band, secondary users have to adopt strict constraints on the resulting interfer-
ence. For example, for the packet-based primary user, CR-OSAN usually constrains
the probability of collision with the primary user’s packet to be under a predefined
threshold. Therefore, it is critical to know how to maximize the secondary user’s
throughput under a certain primary user’s collision probability constraint.