-
1
-
-
84875104203
-
Maximizing battery life: Applying game theory to wireless sensor networks
-
A. Agah, M. Asadi, and C. Zimmerman, "Maximizing battery life: Applying game theory to wireless sensor networks," The WCU Research Consortium, 2011.
-
(2011)
The WCU Research Consortium
-
-
Agah, A.1
Asadi, M.2
Zimmerman, C.3
-
4
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyldiz, Y. Sankarasubramaniam W. Su, and E. Cayirci, "Wireless sensor networks: A survey," Journal of Computer Networks, vol. 38, 2002.
-
(2002)
Journal of Computer Networks
, vol.38
-
-
Akyldiz, I.F.1
Su, S.W.2
Cayirci, E.3
-
6
-
-
0041472588
-
An energy efficient hierarchical clustering algorithm for wireless sensor networks
-
S. Bandyopadhyay and E. Coyle, "An energy efficient hierarchical clustering algorithm for wireless sensor networks," INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Bandyopadhyay, S.1
Coyle, E.2
-
8
-
-
61449149413
-
A game-theoretic approach to efficient power management in sensor networks
-
E. Campos-Nanez, A. Garcia, and C. Li, "A game-theoretic approach to efficient power management in sensor networks," Operations Research, vol. 56, no. 3, pp. 552-561, 2008.
-
(2008)
Operations Research
, vol.56
, Issue.3
, pp. 552-561
-
-
Campos-Nanez, E.1
Garcia, A.2
Li, C.3
-
9
-
-
74349117512
-
Battery recovery aware sensor networks
-
C. Chau, M. H. Wahab, F. Qin, Y. Wang, and Y. Tang, "Battery recovery aware sensor networks," the 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2009.
-
(2009)
the 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
-
-
Chau, C.1
Wahab, M.H.2
Qin, F.3
Wang, Y.4
Tang, Y.5
-
10
-
-
84875096980
-
Battery-aware routing for streaming data transmissions in wireless sensor networks
-
M. Chi and Y. Yang, "Battery-aware routing for streaming data transmissions in wireless sensor networks," Springer Science and Business Media, LLC, 2006.
-
(2006)
Springer Science and Business Media, LLC
-
-
Chi, M.1
Yang, Y.2
-
11
-
-
2942686425
-
Sensor networks: evolution, opportunities, and challenge
-
C. Chong and S. P. Kumar, "Sensor networks: evolution, opportunities, and challenge," Proceedings of the IEEE, Special Issue on Sensor Networks and Application, vol. 91, no. 8, 2003.
-
(2003)
Proceedings of the IEEE, Special Issue on Sensor Networks and Application
, vol.91
, Issue.8
-
-
Chong, C.1
Kumar, S.P.2
-
12
-
-
79960423670
-
Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks
-
G. V. Crosby, L. Hester, and N. Pissinou, "Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks," International Journal of Network Security, vol. 12, no. 2, pp. 107-117, 2011.
-
(2011)
International Journal of Network Security
, vol.12
, Issue.2
, pp. 107-117
-
-
Crosby, G.V.1
Hester, L.2
Pissinou, N.3
-
13
-
-
39749094572
-
Incentive-compatible, energy-optimal, and efficient ad hoc networking in a selfish milieu
-
S. Eidenbenz, L. Anderegg, and R. Wattenhofer, "Incentive-compatible, energy-optimal, and efficient ad hoc networking in a selfish milieu," Proceedings of the 40th Hawaii International conference on system Sciences (HICSS), 2007.
-
(2007)
Proceedings of the 40th Hawaii International conference on system Sciences (HICSS)
-
-
Eidenbenz, S.1
Anderegg, L.2
Wattenhofer, R.3
-
14
-
-
33646747500
-
Topology control games for ad hoc networks
-
S. Eidenbenz, V. S. Kumar, and S. Zust, "Topology control games for ad hoc networks," ACM Mobile Networks and Application, vol. 11, no. 2, 2006.
-
(2006)
ACM Mobile Networks and Application
, vol.11
, Issue.2
-
-
Eidenbenz, S.1
Kumar, V.S.2
Zust, S.3
-
15
-
-
36549012198
-
The commit protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes
-
S. Eidenbenz, G. Resta, and P. Santi, "The commit protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes," IEEE transactions on mobile computing, vol. 7, no. 1, 2008.
-
(2008)
IEEE transactions on mobile computing
, vol.7
, Issue.1
-
-
Eidenbenz, S.1
Resta, G.2
Santi, P.3
-
19
-
-
84875095255
-
-
MEMSIC Inc., "Micaz wireless measurement system
-
MEMSIC Inc., "Micaz wireless measurement system," http://www.memsic.com.
-
-
-
-
20
-
-
45249105634
-
Privacy preserving k-nearest neighbor classification
-
L. Chang J. Zhan and S. Matwin, "Privacy preserving k-nearest neighbor classification," International Journal of Network Security, vol. 1, no. 1, pp. 46-51, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.1
, pp. 46-51
-
-
Chang, L.1
Zhan, J.2
Matwin, S.3
-
24
-
-
53249147143
-
A survey of game-theoretic approaches in wireless sensor networks
-
R. Machado and S. Tekinay, "A survey of game-theoretic approaches in wireless sensor networks," Elsevier Computer Networks Journal, vol. 52, 2008.
-
(2008)
Elsevier Computer Networks Journal
, vol.52
-
-
Machado, R.1
Tekinay, S.2
-
25
-
-
80054056867
-
Validating reliability of omnet++ in wireless networks dos attacks: Simulation vs. testbed
-
M. Malekzadeh, A. A. Abdul Ghani, S. Subramaniam, and J. Desa, "Validating reliability of omnet++ in wireless networks dos attacks: Simulation vs. testbed," International Journal of Network Security, vol. 123, no. 1, pp. 13-21, 2011.
-
(2011)
International Journal of Network Security
, vol.123
, Issue.1
, pp. 13-21
-
-
Malekzadeh, M.1
Abdul Ghani, A.A.2
Subrama-niam, S.3
Desa, J.4
-
26
-
-
10644289075
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communications and Multimedia Security Conference, 2002.
-
(2002)
Communications and Multimedia Security Conference
-
-
Michiardi, P.1
Molva, R.2
-
28
-
-
10644269064
-
Prevention of denial of service attack and selfishness in mobile ad hoc networks
-
Institute Eurecom
-
P. Michiardi and R. Molva, "Prevention of denial of service attack and selfishness in mobile ad hoc networks," Research Report RR-02-063, (Institute Eurecom), 2002.
-
(2002)
Research Report RR-02-063
-
-
Michiardi, P.1
Molva, R.2
-
32
-
-
0004260006
-
-
NY: Academic Press
-
G. Owen, Game Theory. NY: Academic Press, 2001.
-
(2001)
Game Theory
-
-
Owen, G.1
-
33
-
-
33845483127
-
Battery discharge characteristics of wireless sensor nodes: An experimental analysis
-
C. Park, K. Lahiri, and A. Raghunathan, "Battery discharge characteristics of wireless sensor nodes: An experimental analysis," IEEE SECON, 2005.
-
(2005)
IEEE SECON
-
-
Park, C.1
Lahiri, K.2
Raghunathan, A.3
-
35
-
-
33748871335
-
Reputation systems: Facilitating trust in e-commerce systems
-
P. Resnick, K. Kuwabarra, R. Zeckauser, and E. Friedman, "Reputation systems: Facilitating trust in e-commerce systems," Communications of the ACM, vol. 43, no. 12, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
-
-
Resnick, P.1
Kuwabarra, K.2
Zeckauser, R.3
Friedman, E.4
-
36
-
-
75149136526
-
A game theoretic framework for power control in wireless sensor networks
-
S. Sengupta, M. Chatterjee, and K. Kwiat, "A game theoretic framework for power control in wireless sensor networks," IEEE Transactions on COmputers, vol. 59, no. 2, 2010.
-
(2010)
IEEE Transactions on COmputers
, vol.59
, Issue.2
-
-
Sengupta, S.1
Chatterjee, M.2
Kwiat, K.3
-
38
-
-
0036343658
-
An energy efficient mac protocol for wireless sensor networks
-
J. Heidemann W. Ye and D. Estrin, "An energy efficient mac protocol for wireless sensor networks," IEEE INFOCOM, 2002.
-
(2002)
IEEE INFOCOM
-
-
Heidemann, J.1
Ye, W.2
Estrin, D.3
|