Jonas Kronander

Learn More
This article considers spectrum-on-demand in a cellular system. A communication system that wants to access spectrum to which it does not own a license must perform spectrum sensing to identify spectrum opportunities, and to guarantee that it does not cause unacceptable interference to the license owner. Because a single sensor may be in a fading dip,(More)
This paper presents a solution to the problem of setting power limits for white space devices sharing a spectrum band. It is desired to utilize the available white space efficiently while also protecting the primary system from harmful interference. Power limits are set individually for each white space device by maximizing a joint utility measure, e.g.,(More)
Cellular networks today are designed for and operate in dedicated licensed spectrum. At the same time there are other spectrum usage authorization models for wireless communication, such as unlicensed spectrum or, as widely discussed currently but not yet implemented in practice, various forms of licensed shared spectrum. Hence, cellular technology as of(More)
This paper presents a unifying scenario classification model and a selection of scenarios, developed within the EU FP7 QUASAR project to study secondary spectrum usage. The classification model categorizes scenarios from technical, regulatory, and economic perspective. It enables the derivation of the most promising scenarios of secondary spectrum access:(More)
In this article the effect of licensed non-standardized low power transmitters, i.e., PMSE (programme making special event) devices such as wireless microphones, on secondary usage of TV white space is considered. In particular, the performance for energy detection of these devices is studied under realistic fading and interference situations. One(More)
We report results from the recently finished QUASAR project, which has studied overall system aspects of cognitive radio technologies and has paid attention particularly to the economic viability of different use cases. We find that successful secondary sharing goes far beyond the detection of “spectrum holes”. Large-scale commercial success requires that(More)
  • 1