-
2
-
-
34548319693
-
Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards
-
DOI 10.1109/INFCOM.2007.141, 4215723, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
G. Bianchi, A. Di Stefano, C. Giaconia, L. Scalia, G. Terrazzino, and I. Tinnirello, "Experimental assessment of the backoff behavior of commercial IEEE 802.11 b network cards," in Proc. IEEE INFOCOM, May 2007, pp. 1181-1189. (Pubitemid 47334341)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1181-1189
-
-
Bianchi, G.1
Di Stefano, A.2
Giaconia, C.3
Scalia, L.4
Terrazzino, G.5
Tinnirello, I.6
-
3
-
-
34547488337
-
Robust detection of selfish misbehavior in wireless networks
-
DOI 10.1109/JSAC.2007.070807
-
A. Lopez-Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, 2007. (Pubitemid 47171203)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.6
, pp. 1124-1134
-
-
Toledo, A.L.1
Wang, X.2
-
4
-
-
34547435701
-
Reverse-engineering MAC: A non-cooperative game model
-
DOI 10.1109/JSAC.2007.070808
-
J.-W. Lee, A. Tang, J. Huang, M. Chiang, and A. R. Calderbank, "Reverse-engineering MAC: a non-cooperative game model," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1135-1147, Aug. 2007. (Pubitemid 47171204)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.6
, pp. 1135-1147
-
-
Lee, J.-W.1
Tang, A.2
Huang, J.3
Chiang, M.4
Calderbank, A.R.5
-
5
-
-
54549127043
-
The analysis of Nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes
-
H. Inaltekin and S. Wicker, "The analysis of Nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes," IEEE/ACM Trans. Networking, vol. 16, no. 5, pp. 1094-1107, 2008.
-
(2008)
IEEE/ACM Trans. Networking
, vol.16
, Issue.5
, pp. 1094-1107
-
-
Inaltekin, H.1
Wicker, S.2
-
6
-
-
77955769561
-
Random access game and medium access control design
-
Aug.
-
L. Chen, S. H. Low, and J. C. Doyle, "Random access game and medium access control design," IEEE/ACM Trans. Networking, vol. 18, no. 4, pp. 1303-1316, Aug. 2010.
-
(2010)
IEEE/ACM Trans. Networking
, vol.18
, Issue.4
, pp. 1303-1316
-
-
Chen, L.1
Low, S.H.2
Doyle, J.C.3
-
8
-
-
0023453443
-
Analysis of a multiaccess control scheme
-
Nov.
-
J. N. Tsitsiklis, "Analysis of a multiaccess control scheme," IEEE Trans. Autom. Control, vol. AC-32, no. 11, pp. 1017-1020, Nov. 1987.
-
(1987)
IEEE Trans. Autom. Control
, vol.AC-32
, Issue.11
, pp. 1017-1020
-
-
Tsitsiklis, J.N.1
-
10
-
-
18844401150
-
Performance analysis of exponential backoff
-
DOI 10.1109/TNET.2005.845533
-
B. Kwak, N. Song, and L. Miller, "Performance analysis of exponential backoff," IEEE/ACM Trans. Networking, vol. 13, no. 2, pp. 343-355, 2005. (Pubitemid 40690830)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.2
, pp. 343-355
-
-
Kwak, B.-J.1
Song, N.-O.2
Miller, L.E.3
-
11
-
-
70350561673
-
Bounded-mean-delay throughput and nonstarvation conditions in Aloha network
-
S. Liew, Y. Zhang, and D. Chen, "Bounded-mean-delay throughput and nonstarvation conditions in Aloha network," IEEE/ACM Trans. Networking, vol. 17, no. 5, pp. 1606-1618, 2009.
-
(2009)
IEEE/ACM Trans. Networking
, vol.17
, Issue.5
, pp. 1606-1618
-
-
Liew, S.1
Zhang, Y.2
Chen, D.3
|