-
1
-
-
3142603471
-
Slotted aloha as a game with partial information
-
E. Altman, R. El Azouzi, T. Jimenez: Slotted Aloha as a Game with Partial Information. Computer Networks 45 (2004) 701-713
-
(2004)
Computer Networks
, vol.45
, pp. 701-713
-
-
Altman, E.1
El Azouzi, R.2
Jimenez, T.3
-
3
-
-
84925368904
-
802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo, S. Savage: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proc. USENIX Security Symposium (2003)
-
(2003)
Proc. USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
4
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
G. Blanchi: Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE J. Selected Areas Commun. SAC-18 (2000) 535-547
-
(2000)
IEEE J. Selected Areas Commun.
, vol.SAC-18
, pp. 535-547
-
-
Blanchi, G.1
-
5
-
-
25644442524
-
On selfish behavior in CSMA/CA networks
-
Miami, FL
-
M. Cagalj, S. Ganeriwal, I. Aad, J.-P. Hubaux: On Selfish Behavior in CSMA/CA Networks. In: Proceedings of IEEE Infocom '05, Miami, FL (2005)
-
(2005)
Proceedings of IEEE Infocom '05
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.-P.4
-
6
-
-
33745317010
-
Detection and prevention of MAC layer misbehavior in ad hoc networks
-
A. A. Cardenas, S. Radosavac, J. S. Baras: Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks. Univ. of Maryland Tech. Rep. ISR TR 2004-30 (2004)
-
(2004)
Univ. of Maryland Tech. Rep.
, vol.ISR TR 2004-30
-
-
Cardenas, A.A.1
Radosavac, S.2
Baras, J.S.3
-
11
-
-
0011514818
-
Computable strategies for repeated prisoner's dilemma
-
V. Knoblauch: Computable Strategies for Repeated Prisoner's Dilemma. Games and Economic Behavior 7 (1994) 381-389
-
(1994)
Games and Economic Behavior
, vol.7
, pp. 381-389
-
-
Knoblauch, V.1
-
12
-
-
84948142128
-
Multiple access in ad-hoc wireless LANs with noncooperative stations
-
J. Konorski: Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. Springer-Verlag LNCS 2345 (2002) 1141-1146
-
(2002)
Springer-Verlag LNCS
, vol.2345
, pp. 1141-1146
-
-
Konorski, J.1
-
14
-
-
0035508757
-
Game theory and the design of self-configuring, adaptive wireless networks
-
A. B. MacKenzie, S. B. Wicker: Game Theory and the Design of Self-configuring, Adaptive Wireless Networks. IEEE Comm. Magazine 39 (2001) 126-131
-
(2001)
IEEE Comm. Magazine
, vol.39
, pp. 126-131
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
15
-
-
0002298154
-
Adaptive and sophisticated learning in normal form games
-
P. Milgrom, J. Roberts: Adaptive and Sophisticated Learning in Normal Form Games. Games and Economic Behaviour 3 (1991) 82-100
-
(1991)
Games and Economic Behaviour
, vol.3
, pp. 82-100
-
-
Milgrom, P.1
Roberts, J.2
-
16
-
-
33745290254
-
Cooperative and selfish behaviour in unlicensed spectrum using the CSMA/CA protocol
-
O. Queseth: Cooperative and Selfish Behaviour in Unlicensed Spectrum Using the CSMA/CA Protocol.In: Proc. Nordic Radio Symposium (2004)
-
(2004)
Proc. Nordic Radio Symposium
-
-
Queseth, O.1
-
17
-
-
4544324338
-
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
-
M. Raya, J.-P. Hubaux, I. Aad: DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In: Proc. MobiSys Conference (2004)
-
(2004)
Proc. MobiSys Conference
-
-
Raya, M.1
Hubaux, J.-P.2
Aad, I.3
-
20
-
-
25844458509
-
The 802.11 MAC protocol leads to inefficient equilibria
-
Miami, FL
-
G. Tan, J. Guttag: The 802.11 MAC Protocol Leads to Inefficient Equilibria. In: Proceedings of IEEE Infocom '05, Miami, FL (2005)
-
(2005)
Proceedings of IEEE Infocom '05
-
-
Tan, G.1
Guttag, J.2
-
22
-
-
0029728757
-
Evolutionary stability in the n-person iterated prisoners' Dilemma
-
X. Yao: Evolutionary Stability in the n-Person Iterated Prisoners' Dilemma. BioSystems 39 (1996) 189-197
-
(1996)
BioSystems
, vol.39
, pp. 189-197
-
-
Yao, X.1
-
23
-
-
0037082689
-
CSMA/CA performance under high traffic conditions: Throughput and delay analysis
-
E. Ziouva, T. Antonakopoulos: CSMA/CA Performance under High Traffic Conditions: Throughput and Delay Analysis. Computer Comm. 25 (2002) 313-321
-
(2002)
Computer Comm.
, vol.25
, pp. 313-321
-
-
Ziouva, E.1
Antonakopoulos, T.2
|