-
2
-
-
84860407948
-
-
Wi-Fi Alliance
-
Wi-Fi Alliance, www.wi-fi.org
-
-
-
-
3
-
-
34548319693
-
Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards
-
G. Bianchi, A. Di Stefano, C. Giaconia, L. Scalia, G. Terrazzino, and I. Tinnirello, "Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards," in Proc. IEEE Infocom 2007, pp. 1181-1189.
-
Proc. IEEE Infocom 2007
, pp. 1181-1189
-
-
Bianchi, G.1
Di Stefano, A.2
Giaconia, C.3
Scalia, L.4
Terrazzino, G.5
Tinnirello, I.6
-
4
-
-
13444269338
-
Downlink and uplink resource allocation in IEEE 802.11 wireless LANs
-
S. W. Kim, B. S. Kim, and Y. Fang, "Downlink and uplink resource allocation in IEEE 802.11 wireless LANs," in Proc. IEEE Conf. on Vehicular Technology, vol. 54, pp. 320-327, 2005.
-
(2005)
Proc. IEEE Conf. on Vehicular Technology
, vol.54
, pp. 320-327
-
-
Kim, S.W.1
Kim, B.S.2
Fang, Y.3
-
6
-
-
58149141336
-
Game-theoretic EDCA in IEEE 802.11e WLANs
-
L. Zhao, L. Cong, H. Zhang, W. Ding, and J. Zhang, "Game-theoretic EDCA in IEEE 802.11e WLANs," in Proc. IEEE VTC 2008, pp. 1-5.
-
Proc. IEEE VTC
, vol.2008
, pp. 1-5
-
-
Zhao, L.1
Cong, L.2
Zhang, H.3
Ding, W.4
Zhang, J.5
-
7
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
8
-
-
85032750911
-
Medium access in WiFi networks: Strategies of selfish nodes
-
L. Giarré, I. Tinnirello, and G. Neglia, "Medium access in WiFi networks: Strategies of selfish nodes," IEEE Signal Process. Mag., vol. 26, no. 5, pp. 124-127, 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.5
, pp. 124-127
-
-
Giarré, L.1
Tinnirello, I.2
Neglia, G.3
-
9
-
-
33947219764
-
A game-theoretic study of CSMA/CA under a backoff attack
-
J. Konorski, "A game-theoretic study of CSMA/CA under a backoff attack," IEEE/ACM Trans. Netw., vol. 14, no. 6, pp. 1167-1178, 2006.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, Issue.6
, pp. 1167-1178
-
-
Konorski, J.1
-
10
-
-
25644442524
-
On selfish behavior in CSMA/CA networks
-
M. Cagalj, S. Ganeriwal, I. Aad, and J. P. Hubaux, "On selfish behavior in CSMA/CA networks," in Proc. IEEE Infocom 2005, vol. 4, pp. 2513- 2524.
-
(2005)
Proc. IEEE Infocom
, vol.4
, pp. 2513-2524
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.P.4
-
11
-
-
65949113835
-
Efficient MAC in cognitive radio systems: A game-theoretic approach
-
M. Felegyhazi, M. Cagalj, and J. P. Hubaux, "Efficient MAC in cognitive radio systems: A game-theoretic approach," Trans. Wireless Commun., vol. 8, no. 4, pp. 1984-1995, 2009.
-
(2009)
Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1984-1995
-
-
Felegyhazi, M.1
Cagalj, M.2
Hubaux, J.P.3
-
12
-
-
60849097114
-
Contention control: A game-theoretic approach
-
L. Chen, S. H. Low, and J. Doyle, "Contention control: A game-theoretic approach," in Proc. IEEE Conf. On Decision and Control, pp. 3428- 3434, 2007.
-
(2007)
Proc. IEEE Conf. On Decision and Control
, pp. 3428-3434
-
-
Chen, L.1
Low, S.H.2
Doyle, J.3
-
13
-
-
50649091148
-
A game-theoretic framework for medium access control
-
T. Cui, L. Chen, and S. Low, "A game-theoretic framework for medium access control," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1116- 1127, 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.7
, pp. 1116-1127
-
-
Cui, T.1
Chen, L.2
Low, S.3
-
14
-
-
67449097488
-
Modeling IEEE 802.11 DCF in wireless LANs as a dynamic game with incompletely information
-
G. Zhang and H. Zhang, "Modeling IEEE 802.11 DCF in wireless LANs as a dynamic game with incompletely information," in Proc. Conf. on Wireless, Mobile and Multimedia Networks, pp. 215-218, 2008.
-
(2008)
Proc. Conf. on Wireless, Mobile and Multimedia Networks
, pp. 215-218
-
-
Zhang, G.1
Zhang, H.2
-
15
-
-
34848845258
-
Selfishness, not always a nightmare: Modeling selfish MAC behaviors in wireless mobile ad-hoc networks
-
L. Chen and J. Leneutre, "Selfishness, not always a nightmare: Modeling selfish MAC behaviors in wireless mobile ad-hoc networks," in Proc. IEEE ICDCS 2007, pp. 16-23.
-
(2007)
Proc. IEEE ICDCS
, pp. 16-23
-
-
Chen, L.1
Leneutre, J.2
-
16
-
-
63049122215
-
Improved performance with novel utility functions in a game-theoretic model of medium access control in wireless networks
-
D. K. Sanyal, M. Chattopadhyay, and S. Chattopadhyay, "Improved performance with novel utility functions in a game-theoretic model of medium access control in wireless networks," in Proc. IEEE TENCON 2008, pp. 1-6.
-
(2008)
Proc. IEEE TENCON
, pp. 1-6
-
-
Sanyal, D.K.1
Chattopadhyay, M.2
Chattopadhyay, S.3
-
17
-
-
70349986730
-
The role of the access point in Wi-Fi networks with selfish nodes
-
I. Tinnirello, L. Giarré, and G. Neglia, "The role of the access point in Wi-Fi networks with selfish nodes," in Proc. IEEE GameNets, pp. 632-637, 2009.
-
(2009)
Proc. IEEE GameNets
, pp. 632-637
-
-
Tinnirello, I.1
Giarré, L.2
Neglia, G.3
-
18
-
-
77950825749
-
Resource sharing optimality in WiFi infrastructure networks
-
L. Giarré, G. Neglia, and I. Tinnirello, "Resource sharing optimality in WiFi infrastructure networks," in IEEE Proc. Conference on Decision and Control, pp. 5877-5882, 2009.
-
(2009)
IEEE Proc. Conference on Decision and Control
, pp. 5877-5882
-
-
Giarré, L.1
Neglia, G.2
Tinnirello, I.3
-
19
-
-
34249059780
-
A station strategy to deter backoff attacks in IEEE 802.11 LANs
-
J. Konorski, "A station strategy to deter backoff attacks in IEEE 802.11 LANs," Elsevier J. Discrete Algorithms, vol. 5, no. 3, pp. 436-454, 2007.
-
(2007)
Elsevier J. Discrete Algorithms
, vol.5
, Issue.3
, pp. 436-454
-
-
Konorski, J.1
-
20
-
-
39049146012
-
Cross-layer cooperation to handle MAC misbehavior in ad hoc networks
-
L. Guang and C. Assi, "Cross-layer cooperation to handle MAC misbehavior in ad hoc networks," in IEEE Proc. CCECE 2006, pp. 219-222.
-
IEEE Proc. CCECE 2006
, pp. 219-222
-
-
Guang, L.1
Assi, C.2
-
21
-
-
4544324338
-
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
-
R. Maxim, J. P. Hubaux, and I. Aad, "DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots," 2nd International Conference on Mobile Systems, Applications, and Services, 2004.
-
(2004)
2nd International Conference on Mobile Systems, Applications, and Services
-
-
Maxim, R.1
Hubaux, J.P.2
Aad, I.3
-
22
-
-
33750825847
-
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
-
M. Raya, I. Aad, J. P. Hubaux, and A. El Fawal, "DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots," IEEE Trans. Mobile Computing, vol. 5, no. 12, 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, Issue.12
-
-
Raya, M.1
Aad, I.2
Hubaux, J.P.3
El Fawal, A.4
-
23
-
-
34247504187
-
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
-
L. Guang, C. Assi, and Y. Ye, "DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks," Computer Commun., vol. 30, no. 8, pp 1841-1853, 2007.
-
(2007)
Computer Commun.
, vol.30
, Issue.8
, pp. 1841-1853
-
-
Guang, L.1
Assi, C.2
Ye, Y.3
-
24
-
-
27644511370
-
Remarks on IEEE 802.11 performance analysis
-
G. Bianchi and I. Tinnirello, "Remarks on IEEE 802.11 performance analysis," IEEE Commun. Lett., vol. 9, no. 8, pp. 765-767, 2005.
-
(2005)
IEEE Commun. Lett.
, vol.9
, Issue.8
, pp. 765-767
-
-
Bianchi, G.1
Tinnirello, I.2
-
26
-
-
79953132127
-
A game theoretic approach to MAC design for infrastructure networks
-
I. Tinnirello, L. Giarré, and G. Neglia, "A game theoretic approach to MAC design for infrastructure networks, in Proc. IEEE CDC, pp. 1933- 1939, 2010.
-
(2010)
Proc. IEEE CDC
, pp. 1933-1939
-
-
Tinnirello, I.1
Giarré, L.2
Neglia, G.3
|