-
1
-
-
3142603471
-
Slotted Aloha as a game with partial information
-
Altman, E., Azouzi, R.E. and Jiménez, T. (2004) ‘Slotted Aloha as a game with partial information’, Computer Networks Journal (Elsevier), Vol. 45, No. 6, pp.701–713.
-
(2004)
Computer Networks Journal (Elsevier)
, vol.45
, Issue.6
, pp. 701-713
-
-
Altman, E.1
Azouzi, R.E.2
Jiménez, T.3
-
2
-
-
0003713964
-
-
2nd ed., Athena Scientific, Belmont, Massachusetts
-
Bertsekas, D.P. (1999) Nonlinear Programming, 2nd ed., Athena Scientific, Belmont, Massachusetts.
-
(1999)
Nonlinear Programming
-
-
Bertsekas, D.P.1
-
3
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
March
-
Bianchi, G. (2000) ‘Performance analysis of the IEEE 802.11 distributed coordination function’, IEEE Journal on Selected Areas in Communications, Vol. 18, No. 3, March, pp.535–547.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
4
-
-
25644442524
-
On selfish behavior in CSMA/CA networks
-
Miami, Florida, USA March
-
Cagalj, M., Ganeriwal, S., Aad, I. and Hubaux, J-P. (2005) ‘On selfish behavior in CSMA/CA networks’, Proceedings IEEE INFOCOM, Miami, Florida, USA, Vol. 4, 13–17 March, pp.2513–2524.
-
(2005)
Proceedings IEEE INFOCOM
, vol.4
, Issue.13-17
, pp. 2513-2524
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.-P.4
-
6
-
-
33646385867
-
Distributed interference compensation for wireless networks
-
May
-
Huang, J., Berry, R. and Honig, M.L. (2006) ‘Distributed interference compensation for wireless networks’, IEEE Journal on Selected Areas in Communications, Vol. 24, No. 5, May, pp.1074–1084.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.5
, pp. 1074-1084
-
-
Huang, J.1
Berry, R.2
Honig, M.L.3
-
7
-
-
34547412444
-
Distributed contention window control for selfish users in IEEE 802.11 wireless LANs
-
Jin, Y. and Kesidis, G. (2007) ‘Distributed contention window control for selfish users in IEEE 802.11 wireless LANs’, IEEE Journal on Selected Areas in Communications, Vol. 25, No. 6, pp.1113–1123.
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.6
, pp. 1113-1123
-
-
Jin, Y.1
Kesidis, G.2
-
8
-
-
34547408194
-
Utility-optimal random-access protocol
-
July
-
Lee, J-W., Chiang, M. and Calderbank, R. (2007) ‘Utility-optimal random-access protocol’, IEEE Transactions on Wireless Communications, Vol. 6, No. 7, July, pp.2741–2751.
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.7
, pp. 2741-2751
-
-
Lee, J.-W.1
Chiang, M.2
Calderbank, R.3
-
9
-
-
34547488337
-
Robust detection of selfish misbehavior in wireless networks
-
Special Issue on Non-cooperative Behavior in Networking July
-
Lopez Toledo, A. and Wang, X. (2007) ‘Robust detection of selfish misbehavior in wireless networks’, IEEE Journal on Selected Areas in Communications, Special Issue on Non-cooperative Behavior in Networking, Vol. 25, No. 6, July, pp.1124–1134.
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.6
, pp. 1124-1134
-
-
Lopez Toledo, A.1
Wang, X.2
-
10
-
-
0042474409
-
Stability of multipacket slotted aloha with selfish users and perfect information
-
30 March-3 April
-
MacKenzie, A.B. and Wicker, S.B. (2003) ‘Stability of multipacket slotted aloha with selfish users and perfect information’, Proceedings IEEE INFOCOM, Vol. 3, 30 March-3 April, pp.583–1590.
-
(2003)
Proceedings IEEE INFOCOM
, vol.3
, pp. 583-1590
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
11
-
-
0036474829
-
Efficient power control via pricing in wireless data networks
-
Saraydar, C., Mandayam, N.B. and Goodman, D.J. (2002) ‘Efficient power control via pricing in wireless data networks’, IEEE Trans. Commun., Vol. 50, February, pp.291–303.
-
(2002)
IEEE Trans. Commun.
, vol.50
, Issue.February
, pp. 291-303
-
-
Saraydar, C.1
Mandayam, N.B.2
Goodman, D.J.3
-
12
-
-
84876032211
-
Uniqueness of generalized equilibrium for box constrained problems and applications
-
Simsek, A., Ozdaglar, A. and Acemoglu, D. (2005) ‘Uniqueness of generalized equilibrium for box constrained problems and applications’, Proc. Allerton.
-
(2005)
Proc. Allerton
-
-
Simsek, A.1
Ozdaglar, A.2
Acemoglu, D.3
-
13
-
-
84886571225
-
Reverse engineering MAC
-
Tang, A., Lee, J-W., Huang, J., Chiang, M. and Calderbank, R. (2006) ‘Reverse engineering MAC’, Proceedings of WiOpt, April 3–6, pp.1–11.
-
(2006)
Proceedings of WiOpt
, vol.April 3–6
, pp. 1-11
-
-
Tang, A.1
Lee, J.-W.2
Huang, J.3
Chiang, M.4
Calderbank, R.5
-
15
-
-
17744372911
-
Game theory models for IEEE 802.11 DCF in wireless ad hoc networks
-
Xiao, Y., Shan, X. and Ren, Y. (2005) ‘Game theory models for IEEE 802.11 DCF in wireless ad hoc networks’, IEEE Communications Magazine, Vol. 43, No. 3, pp.s22-s26.
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.3
, pp. s22-s26
-
-
Xiao, Y.1
Shan, X.2
Ren, Y.3
-
16
-
-
37549035855
-
Distributed optimal contention window control for elastic traffic in single cell wireless LANs
-
Yang, Y., Wang, J. and Kravets, R. (2007) ‘Distributed optimal contention window control for elastic traffic in single cell wireless LANs’, IEEE Transaction on Networking, Vol. 15, No. 6, pp.1373–1386.
-
(2007)
IEEE Transaction on Networking
, vol.15
, Issue.6
, pp. 1373-1386
-
-
Yang, Y.1
Wang, J.2
Kravets, R.3
-
17
-
-
84952959212
-
-
Hereafter, we use the terms ‘user’ and ‘node’ interchangeably
-
Hereafter, we use the terms ‘user’ and ‘node’ interchangeably.
-
-
-
|