-
1
-
-
34548132722
-
Using game theory to analyze wireless ad hoc networks
-
V. Srivastava, J. Neel, A. MacKenzie, R. Menon, L. DaSilva, J. Hicks, J. Reed, and R. Gilles, "Using game theory to analyze wireless ad hoc networks," IEEE Commun. Surveys & Tutorials, vol. 7, no. 4, pp. 46-56, 2005.
-
(2005)
IEEE Commun. Surveys & Tutorials
, vol.7
, Issue.4
, pp. 46-56
-
-
Srivastava, V.1
Neel, J.2
MacKenzie, A.3
Menon, R.4
Dasilva, L.5
Hicks, J.6
Reed, J.7
Gilles, R.8
-
2
-
-
80053241965
-
Game theoretic approaches for multiple access in wireless networks: A survey
-
K. Akkarajitsakul, E. Hossain, D. Niyato, and D. Kim, "Game theoretic approaches for multiple access in wireless networks: A survey," IEEE Commun. Surveys & Tutorials, vol. 13, no. 3, pp. 372-395, 2011.
-
(2011)
IEEE Commun. Surveys & Tutorials
, vol.13
, Issue.3
, pp. 372-395
-
-
Akkarajitsakul, K.1
Hossain, E.2
Niyato, D.3
Kim, D.4
-
3
-
-
0016593204
-
Aloha packet broadcasting: A retrospect
-
R. Binder, N. Abramson, F. Kuo, A. Okinaka, and D. Wax, "Aloha packet broadcasting: a retrospect," in Proc. May 19-22, 1975, national computer conference and exposition. ACM, 1975, pp. 203-215.
-
(1975)
Proc May 19-22 1975, National Computer Conference and Exposition. ACM
, pp. 203-215
-
-
Binder, R.1
Abramson, N.2
Kuo, F.3
Okinaka, A.4
Wax, D.5
-
5
-
-
0002544335
-
Aloha packet system with and without slots and capture
-
L. Roberts, "Aloha packet system with and without slots and capture," ACM SIGCOMM Computer Communication Review, vol. 5, no. 2, pp. 28-42, 1975.
-
(1975)
ACM SIGCOMM Computer Communication Review
, vol.5
, Issue.2
, pp. 28-42
-
-
Roberts, L.1
-
7
-
-
84948970237
-
-
Wiley
-
B. Walke, S. Mangold, and L. Berlemann, IEEE 802 wireless systems: protocols, multi-hop mesh/relaying, performance and spectrum coexistence. Wiley, 2007.
-
(2007)
IEEE 802 Wireless Systems: Protocols, Multi-hop Mesh/relaying, Performance and Spectrum Coexistence
-
-
Walke, B.1
Mangold, S.2
Berlemann, L.3
-
8
-
-
84881479118
-
Mac algorithms in wireless networks Master's thesis
-
S. Tariq, "Mac algorithms in wireless networks," Master's thesis, Dept. Comp. SCI., 2005.
-
(2005)
Dept. Comp. SCI
-
-
Tariq, S.1
-
9
-
-
29644436745
-
Medium access control protocols for ad hoc wireless networks: A survey
-
S. Kumar, V. Raghavan, and J. Deng, "Medium access control protocols for ad hoc wireless networks: A survey," Ad Hoc Networks, vol. 4, no. 3, pp. 326-358, 2006.
-
(2006)
Ad Hoc Networks
, vol.4
, Issue.3
, pp. 326-358
-
-
Kumar, S.1
Raghavan, V.2
Deng, J.3
-
10
-
-
23944514713
-
A survey, classification and comparative analysis of medium access control protocols for ad hoc networks
-
R. Jurdak, C. Lopes, and P. Baldi, "A survey, classification and comparative analysis of medium access control protocols for ad hoc networks," IEEE Commun. Surveys & Tutorials, vol. 6, no. 1, pp. 2-16, 2004.
-
(2004)
IEEE Commun. Surveys & Tutorials
, vol.6
, Issue.1
, pp. 2-16
-
-
Jurdak, R.1
Lopes, C.2
Baldi, P.3
-
12
-
-
0003897853
-
-
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification
-
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 2007.
-
(2007)
IEEE Std. 802.11
-
-
-
13
-
-
38549089684
-
Using incompletely cooperative game theory in mobile ad hoc networks Communications 2007. ICC'07
-
L. Zhao, J. Zhang, K. Yang, and H. Zhang, "Using incompletely cooperative game theory in mobile ad hoc networks," in Communications, 2007. ICC'07. IEEE International Conference on. IEEE, 2007, pp. 3401-3406.
-
(2007)
IEEE International Conference On. IEEE
, pp. 3401-3406
-
-
Zhao, L.1
Zhang, J.2
Yang, K.3
Zhang, H.4
-
14
-
-
34547412444
-
Distributed contention window control for selfish users in ieee 802.11 wireless lans
-
Y. Jin and G. Kesidis, "Distributed contention window control for selfish users in ieee 802.11 wireless lans," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1113-1123, 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.6
, pp. 1113-1123
-
-
Jin, Y.1
Kesidis, G.2
-
15
-
-
17744372911
-
Game theory models for ieee 802.11 dcf in wireless ad hoc networks
-
Y. Xiao, X. Shan, and Y. Ren, "Game theory models for ieee 802.11 dcf in wireless ad hoc networks," IEEE Commun. Mag., vol. 43, no. 3, pp. S22-S26, 2005.
-
(2005)
IEEE Commun. Mag
, vol.43
, Issue.3
-
-
Xiao, Y.1
Shan, X.2
Ren, Y.3
-
17
-
-
77953926975
-
Algorithmic game theory
-
T. Roughgarden, "Algorithmic game theory," Communications of the ACM, vol. 53, no. 7, pp. 78-86, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.7
, pp. 78-86
-
-
Roughgarden, T.1
-
18
-
-
84926132556
-
-
Cambridge University Press
-
Z. Han, D. Niyato, W. Saad, T. Başar, and A. Hjørungnes, Game theory in wireless and communication networks: theory, models, and applications. Cambridge University Press, 2011.
-
(2011)
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications
-
-
Han, Z.1
Niyato, D.2
Saad, W.3
Başar, T.4
Hjørungnes, A.5
-
23
-
-
84881478377
-
Lecture notes on non-cooperative game theory
-
T. Basar, "Lecture notes on non-cooperative game theory," Hamilton, Tech. Rep., 2010.
-
(2010)
Hamilton, Tech. Rep
-
-
Basar, T.1
-
26
-
-
33751113695
-
Game theory for wireless engineers
-
A. MacKenzie and L. DaSilva, "Game theory for wireless engineers," Synthesis Lectures on Communications, vol. 1, no. 1, pp. 1-86, 2006.
-
(2006)
Synthesis Lectures on Communications
, vol.1
, Issue.1
, pp. 1-86
-
-
MacKenzie, A.1
Dasilva, L.2
-
27
-
-
3142603471
-
Slotted aloha as a game with partial information
-
E. Altman, R. El Azouzi, and T. Jiḿenez, "Slotted aloha as a game with partial information," Computer Networks, vol. 45, no. 6, pp. 701-713, 2004.
-
(2004)
Computer Networks
, vol.45
, Issue.6
, pp. 701-713
-
-
Altman, E.1
El Azouzi, R.2
Jiḿenez, T.3
-
29
-
-
78649475848
-
A survey on game theory applications in wireless networks
-
D. Charilas and A. Panagopoulos, "A survey on game theory applications in wireless networks," Computer Networks, vol. 54, no. 18, pp. 3421-3430, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.18
, pp. 3421-3430
-
-
Charilas, D.1
Panagopoulos, A.2
-
30
-
-
84881477081
-
Thinking strategically: The competitive edge in business, politics, and everyday life
-
A. Dixit and B. Nalebuff, Thinking strategically: The competitive edge in business, politics, and everyday life. W. W. Norton, 1993.
-
(1993)
W. W. Norton
-
-
Dixit, A.1
Nalebuff, B.2
-
31
-
-
0035508757
-
Game theory and the design of self-configuring, adaptive wireless networks
-
A. MacKenzie and S. Wicker, "Game theory and the design of self-configuring, adaptive wireless networks," IEEE Commun. Mag., vol. 39, no. 11, pp. 126-131, 2001.
-
(2001)
IEEE Commun. Mag
, vol.39
, Issue.11
, pp. 126-131
-
-
MacKenzie, A.1
Wicker, S.2
-
33
-
-
50649091148
-
A game-theoretic framework for medium access control
-
T. Cui, L. Chen, and S. Low, "A game-theoretic framework for medium access control," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1116-1127, 2008.
-
(2008)
IEEE J. Sel. Areas Commun
, vol.26
, Issue.7
, pp. 1116-1127
-
-
Cui, T.1
Chen, L.2
Low, S.3
-
34
-
-
80051757197
-
Distributed resource allocation in wireless networks under uncertainty and application of bayesian game
-
K. Akkarajitsakul, E. Hossain, and D. Niyato, "Distributed resource allocation in wireless networks under uncertainty and application of bayesian game," IEEE Commun. Mag., vol. 49, no. 8, pp. 120-127, 2011.
-
(2011)
IEEE Commun. Mag
, vol.49
, Issue.8
, pp. 120-127
-
-
Akkarajitsakul, K.1
Hossain, E.2
Niyato, D.3
-
35
-
-
34547435125
-
-
[Online]. Available
-
J. Levin, "Supermodular games," 2012. [Online]. Available: http://www.stanford.edu/?jdlevin/Econ286/SupermodularGames.pdf
-
(2012)
Supermodular Games
-
-
Levin, J.1
-
37
-
-
33646422015
-
Utility-optimal medium access control: Reverse and forward engineering
-
J. Lee, M. Chiang, and A. Calderbank, "Utility-optimal medium access control: reverse and forward engineering," in Proc. IEEE Infocom, 2006.
-
(2006)
Proc. IEEE Infocom
-
-
Lee, J.1
Chiang, M.2
Calderbank, A.3
-
40
-
-
84964715231
-
Applications of game theory in ad hoc networks
-
J. Leino, "Applications of game theory in ad hoc networks," UNe, vol. 100, pp. 5-2, 2003.
-
(2003)
UNe
, vol.100
, pp. 5-2
-
-
Leino, J.1
-
42
-
-
84881476900
-
A taxonomy of game theoretic approaches against attacks in wireless ad hoc networks
-
X. Liao, D. Hao, and K. Sakurai, "A taxonomy of game theoretic approaches against attacks in wireless ad hoc networks," Proc. 28th SCIS, pp. 25-28, 2011.
-
(2011)
Proc. 28th SCIS
, pp. 25-28
-
-
Liao, X.1
Hao, D.2
Sakurai, K.3
-
47
-
-
14844282678
-
On cheating in csma/ca ad hoc networks
-
S. Ganeriwal, I. Aad, J. Hubaux et al., "On cheating in csma/ca ad hoc networks," EPFL-IC, Tech. Rep., 2004.
-
(2004)
EPFL-IC, Tech. Rep
-
-
Ganeriwal, S.1
Aad, I.2
Hubaux, J.3
-
48
-
-
25644442524
-
On selfish behavior in csma/ca networks
-
IEEE
-
M. Cagalj, S. Ganeriwal, I. Aad, and J. Hubaux, "On selfish behavior in csma/ca networks," in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proc. IEEE, vol. 4. IEEE, 2005, pp. 2513-2524.
-
(2005)
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proc. IEEE
, vol.4
, pp. 2513-2524
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.4
-
49
-
-
67449097488
-
Modelling ieee 802.11 dcf in wireless lans as a dynamic game with incompletely information
-
G. Zhang and H. Zhang, "Modelling ieee 802.11 dcf in wireless lans as a dynamic game with incompletely information," in Wireless, Mobile and Multimedia Networks, 2008. IET International Conference on. IET, 2008, pp. 215-218.
-
(2008)
Wireless, Mobile and Multimedia Networks 2008. IET International Conference On. IET
, pp. 215-218
-
-
Zhang, G.1
Zhang, H.2
-
50
-
-
62449251420
-
A novel mac scheme for wireless lans from the perspective of game theory
-
G. Zhang, H. Zhang, and L. Zhao, "A novel mac scheme for wireless lans from the perspective of game theory," in Wireless, Mobile and Sensor Networks, 2007.(CCWMSN07). IET Conference on. IET, 2007, pp. 112-116.
-
(2007)
Wireless, Mobile and Sensor Networks 2007.(CCWMSN07). IET Conference On. IET
, pp. 112-116
-
-
Zhang, G.1
Zhang, H.2
Zhao, L.3
-
51
-
-
77955769561
-
Random access game and medium access control design
-
L. Chen, S. Low, and J. Doyle, "Random access game and medium access control design," IEEE/ACM Trans. Netw. (TON), vol. 18, no. 4, pp. 1303-1316, 2010.
-
(2010)
IEEE/ACM Trans. Netw. (TON)
, vol.18
, Issue.4
, pp. 1303-1316
-
-
Chen, L.1
Low, S.2
Doyle, J.3
-
52
-
-
84923094968
-
A game-theoretic model for medium access control
-
L. Chen, T. Cui, S. Low, and J. Doyle, "A game-theoretic model for medium access control," in Proc. International Wireless Internet Conference (WICON), 2007.
-
(2007)
Proc. International Wireless Internet Conference (WICON)
-
-
Chen, L.1
Cui, T.2
Low, S.3
Doyle, J.4
-
53
-
-
34547435701
-
Reverseengineering mac: A non-cooperative game model
-
L. Jang-Won, T. Ao, H. Jianwei, M. Chiang, and A. Robert, "Reverseengineering mac: A non-cooperative game model," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1135-1147, 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.6
, pp. 1135-1147
-
-
Jang-Won, L.1
Ao, T.2
Jianwei, H.3
Chiang, M.4
Robert, A.5
-
54
-
-
34547408194
-
Utility-optimalr-andom-access control
-
J. Lee, M. Chiang, and A. Calderbank, "Utility-optimal random-access control," IEEE Trans. Wireless Commun., vol. 6, no. 7, pp. 2741-2751, 2007.
-
(2007)
IEEE Trans. Wireless Commun
, vol.6
, Issue.7
, pp. 2741-2751
-
-
Lee, J.1
Chiang, M.2
Calderbank, A.3
-
55
-
-
60849097114
-
Contention control: A game-theoretic approach
-
L. Chen, S. Low, and J. Doyle, "Contention control: A game-theoretic approach," in Decision and Control, 2007 46th IEEE Conference on. IEEE, 2007, pp. 3428-3434.
-
(2007)
Decision and Control 2007 46th IEEE Conference On. IEEE
, pp. 3428-3434
-
-
Chen, L.1
Low, S.2
Doyle, J.3
-
56
-
-
51349086842
-
Design of robust random access protocols for wireless networks using game theoretic models
-
Y. Cho, C. Hwang, and F. Tobagi, "Design of robust random access protocols for wireless networks using game theoretic models," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008, pp. 1750-1758.
-
(2008)
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE
, pp. 1750-1758
-
-
Cho, Y.1
Hwang, C.2
Tobagi, F.3
-
57
-
-
34547232500
-
Random access in wireless ad hoc networks for throughput maximization
-
B. Yang, G. Feng, and X. Guan, "Random access in wireless ad hoc networks for throughput maximization," in Control, Automation, Robotics and Vision, 2006. ICARCV'06. 9th International Conference on. IEEE, 2006, pp. 1-6.
-
(2006)
Control, Automation, Robotics and Vision 2006. ICARCV'06. 9th International Conference On. IEEE
, pp. 1-6
-
-
Yang, B.1
Feng, G.2
Guan, X.3
-
58
-
-
84881475481
-
Random access game in ad hoc networks with cooperative and noncooperative users
-
X. Guan, B. Yang, G. Feng, and C. Long, "Random access game in ad hoc networks with cooperative and noncooperative users," International Journal of Systems, Control and Communications, vol. 1, no. 1, pp. 13-30, 2008.
-
(2008)
International Journal of Systems, Control and Communications
, vol.1
, Issue.1
, pp. 13-30
-
-
Guan, X.1
Yang, B.2
Feng, G.3
Long, C.4
-
60
-
-
4143121200
-
Design and implementation of a mac scheme for wireless ad-hoc networks based on a cooperative game framework
-
IEEE
-
Z. Fang and B. Bensaou, "Design and implementation of a mac scheme for wireless ad-hoc networks based on a cooperative game framework," in Communications, 2004 IEEE International Conference on, vol. 7. IEEE, 2004, pp. 4034-4038.
-
(2004)
Communications 2004 IEEE International Conference on
, vol.7
, pp. 4034-4038
-
-
Fang, Z.1
Bensaou, B.2
-
61
-
-
77955301143
-
An energy-efficient mac protocol in wireless sensor networks: A game theoretic approach
-
S. Mehta and K. Kwak, "An energy-efficient mac protocol in wireless sensor networks: A game theoretic approach," EURASIP Journal on Wireless Communications and Networking, vol. 2010, p. 17, 2010.
-
(2010)
EURASIP Journal on Wireless Communications and Networking
, vol.2010
, pp. 17
-
-
Mehta, S.1
Kwak, K.2
-
62
-
-
78649894384
-
An improved backoff algorithm for wireless sensor network based on game theory
-
Y. Jin, H. Miao, H. Liu, and Y. Xiong, "An improved backoff algorithm for wireless sensor network based on game theory," in Wireless Mobile and Computing (CCWMC 2009), IET International Communication Conference on. IET, 2009, pp. 197-200.
-
(2009)
Wireless Mobile and Computing (CCWMC 2009), IET International Communication Conference On. IET
, pp. 197-200
-
-
Jin, Y.1
Miao, H.2
Liu, H.3
Xiong, Y.4
-
63
-
-
33847307810
-
Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless lans
-
M. Heusse, F. Rousseau, R. Guillier, and A. Duda, "Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless lans," ACM SIGCOMM Computer Communication Review, vol. 35, no. 4, pp. 121-132, 2005.
-
(2005)
ACM SIGCOMM Computer Communication Review
, vol.35
, Issue.4
, pp. 121-132
-
-
Heusse, M.1
Rousseau, F.2
Guillier, R.3
Duda, A.4
-
64
-
-
51649111480
-
Using incompletely cooperative game theory in wireless sensor networks
-
L. Zhao, H. Zhang, and J. Zhang, "Using incompletely cooperative game theory in wireless sensor networks," in Wireless Communications and Networking Conference, WCNC 2008. IEEE. IEEE, 2008, pp. 1483-1488.
-
(2008)
Wireless Communications and Networking Conference, WCNC. 2008. IEEE. IEEE
, pp. 1483-1488
-
-
Zhao, L.1
Zhang, H.2
Zhang, J.3
-
65
-
-
52649131900
-
Selfish traffic with rational nodes in wlans
-
L. Zhao, H. Zhang, J. Zhang, and H. Zhang, "Selfish traffic with rational nodes in wlans," IEEE Commun. Lett., vol. 12, no. 9, pp. 645-647, 2008.
-
(2008)
IEEE Commun. Lett
, vol.12
, Issue.9
, pp. 645-647
-
-
Zhao, L.1
Zhang, H.2
Zhang, J.3
Zhang, H.4
-
66
-
-
39549111441
-
Using incompletely cooperative game theory in wireless mesh networks
-
L. Zhao, J. Zhang, and H. Zhang, "Using incompletely cooperative game theory in wireless mesh networks," IEEE Network, vol. 22, no. 1, pp. 39-44, 2008.
-
(2008)
IEEE Network
, vol.22
, Issue.1
, pp. 39-44
-
-
Zhao, L.1
Zhang, J.2
Zhang, H.3
-
67
-
-
52949099188
-
Game-theoretic cross-layer design in wlans
-
L. Zhao, X. Zou, H. Zhang, W. Ding, and J. Zhang, "Game-theoretic cross-layer design in wlans," in Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08. International. IEEE, 2008, pp. 570-575.
-
(2008)
Wireless Communications and Mobile Computing Conference 2008. IWCMC'08. International IEEE
, pp. 570-575
-
-
Zhao, L.1
Zou, X.2
Zhang, H.3
Ding, W.4
Zhang, J.5
-
68
-
-
67651236676
-
Game-theoretic medium access control protocol for wireless sensor networks
-
L. Zhao, L. Guo, J. Zhang, and H. Zhang, "Game-theoretic medium access control protocol for wireless sensor networks," IET Commun., vol. 3, no. 8, pp. 1274-1283, 2009.
-
(2009)
IET Commun
, vol.3
, Issue.8
, pp. 1274-1283
-
-
Zhao, L.1
Guo, L.2
Zhang, J.3
Zhang, H.4
-
69
-
-
62949176323
-
An energyefficient mac protocol for wsns: Game-theoretic constraint optimization
-
L. Zhao, L. Guo, G. Zhang, H. Zhang, and K. Yang, "An energyefficient mac protocol for wsns: Game-theoretic constraint optimization," in Communication Systems, 2008. ICCS 2008. 11th IEEE Singapore International Conference on. IEEE, 2008, pp. 114-118.
-
(2008)
Communication Systems 2008. ICCS 2008. 11th IEEE Singapore International Conference On. IEEE
, pp. 114-118
-
-
Zhao, L.1
Guo, L.2
Zhang, G.3
Zhang, H.4
Yang, K.5
-
70
-
-
77955301143
-
Performance analysis of binary exponential backoff and improved backoff for wpan
-
S. Mehta and K. Kwak, "Performance analysis of binary exponential backoff and improved backoff for wpan," EURASIP Journal on Wireless Communications and Networking, vol. 2010, p. 1, 2010.
-
(2010)
EURASIP Journal on Wireless Communications and Networking
, vol.2010
, pp. 1
-
-
Mehta, S.1
Kwak, K.2
-
72
-
-
0033749075
-
Performance analysis of the ieee 802.11 distributed coordination function
-
G. Bianchi, "Performance analysis of the ieee 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, 2000.
-
(2000)
IEEE J. Sel. Areas Commun
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
73
-
-
85008537091
-
Batch and sequential bayesian estimators of the number of active terminals in an ieee 802.11 network
-
T. Vercauteren, A. Toledo, and X. Wang, "Batch and sequential bayesian estimators of the number of active terminals in an ieee 802.11 network," IEEE Trans. Signal Process., vol. 55, no. 2, pp. 437-450, 2007.
-
(2007)
IEEE Trans. Signal Process
, vol.55
, Issue.2
, pp. 437-450
-
-
Vercauteren, T.1
Toledo, A.2
Wang, X.3
-
74
-
-
79955066038
-
An energy-efficient mac protocol for wsns: Game-theoretic constraint optimization with multiple objectives
-
L. Zhao, L. Guo, L. Cong, and H. Zhang, "An energy-efficient mac protocol for wsns: game-theoretic constraint optimization with multiple objectives," Wireless Sensor Networks, vol. 1, pp. 358-364, 2009.
-
(2009)
Wireless Sensor Networks
, vol.1
, pp. 358-364
-
-
Zhao, L.1
Guo, L.2
Cong, L.3
Zhang, H.4
-
75
-
-
58149141336
-
Game-theoretic edca in ieee 802.11 e wlans
-
L. Zhao, L. Cong, H. Zhang, W. Ding, and J. Zhang, "Game-theoretic edca in ieee 802.11 e wlans," in Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, 2008, pp. 1-5.
-
(2008)
Vehicular Technology Conference 2008. VTC 2008-Fall IEEE 68th. IEEE
, pp. 1-5
-
-
Zhao, L.1
Cong, L.2
Zhang, H.3
Ding, W.4
Zhang, J.5
-
76
-
-
69949170001
-
Game-theoretic particle swarm optimization for wmns
-
L. Zhao, H. Zhang, W. Ding, and J. Zhang, "Game-theoretic particle swarm optimization for wmns," in Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008. IEEE 19th International Symposium on. IEEE, 2008, pp. 1-5.
-
(2008)
Personal, Indoor and Mobile Radio Communications 2008. PIMRC 2008 IEEE 19th International Symposium On. IEEE
, pp. 1-5
-
-
Zhao, L.1
Zhang, H.2
Ding, W.3
Zhang, J.4
-
77
-
-
85032750911
-
Medium access in wifi networks: Strategies of selfish nodes [applications corner]
-
L. Giarŕe, G. Neglia, and I. Tinnirello, "Medium access in wifi networks: strategies of selfish nodes [applications corner]," IEEE Signal Processing Mag., vol. 26, no. 5, pp. 124-128, 2009.
-
(2009)
IEEE Signal Processing Mag
, vol.26
, Issue.5
, pp. 124-128
-
-
Giarŕe, L.1
Neglia, G.2
Tinnirello, I.3
-
78
-
-
50649099699
-
A game theoretic framework of distributed power and rate control in ieee 802.11 wlans
-
L. Chen and J. Leneutre, "A game theoretic framework of distributed power and rate control in ieee 802.11 wlans," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1128-1137, 2008.
-
(2008)
IEEE J. Sel. Areas Commun
, vol.26
, Issue.7
, pp. 1128-1137
-
-
Chen, L.1
Leneutre, J.2
-
80
-
-
63049122215
-
Improved performance with novel utility functions in a game-theoretic model of medium access control in wireless networks
-
D. Sanyal, M. Chattopadhyay, and S. Chattopadhyay, "Improved performance with novel utility functions in a game-theoretic model of medium access control in wireless networks," in TENCON 2008-2008 IEEE Region 10 Conference. IEEE, 2008, pp. 1-6.
-
(2008)
TENCON 2008-2008 IEEE Region 10 Conference. IEEE
, pp. 1-6
-
-
Sanyal, D.1
Chattopadhyay, M.2
Chattopadhyay, S.3
-
82
-
-
58049130861
-
Contention access game method in wireless adhoc networks
-
X. He and L. Tan, "Contention access game method in wireless adhoc networks," in Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference on. IEEE, 2008, pp. 1-4.
-
(2008)
Wireless Communications, Networking and Mobile Computing 2008. WiCOM'08. 4th International Conference On. IEEE
, pp. 1-4
-
-
He, X.1
Tan, L.2
-
84
-
-
34848845258
-
Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks
-
L. Chen and J. Leneutre, "Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks," in Distributed Computing Systems, 2007. ICDCS'07. 27th International Conference on. IEEE, 2007, pp. 16-16.
-
(2007)
Distributed Computing Systems 2007. ICDCS'07. 27th International Conference on IEEE
, pp. 16-16
-
-
Chen, L.1
Leneutre, J.2
-
85
-
-
77954479354
-
Two rounds game csma algorithm of wsns
-
IEEE
-
J. Yang and H. Shi, "Two rounds game csma algorithm of wsns," in Networking and Digital Society (ICNDS), 2010 2nd International Conference on, vol. 1. IEEE, 2010, pp. 270-273.
-
(2010)
Networking and Digital Society (ICNDS), 2010 2nd International Conference on
, vol.1
, pp. 270-273
-
-
Yang, J.1
Shi, H.2
-
86
-
-
0037082689
-
Csma/ca performance under high traffic conditions: Throughput and delay analysis
-
E. Ziouva and T. Antonakopoulos, "Csma/ca performance under high traffic conditions: throughput and delay analysis," Computer Communications, vol. 25, no. 3, pp. 313-321, 2002.
-
(2002)
Computer Communications
, vol.25
, Issue.3
, pp. 313-321
-
-
Ziouva, E.1
Antonakopoulos, T.2
-
87
-
-
28244481387
-
Fair bandwidth sharing in distributed systems: A game-theoretic approach
-
S. Rakshit and R. Guha, "Fair bandwidth sharing in distributed systems: a game-theoretic approach," IEEE Trans. Comput., vol. 54, no. 11, pp. 1384-1393, 2005.
-
(2005)
IEEE Trans. Comput
, vol.54
, Issue.11
, pp. 1384-1393
-
-
Rakshit, S.1
Guha, R.2
-
88
-
-
79952946630
-
On selfish behavior in wireless sensor networks: A game theoretic case study
-
IEEE
-
M. Yan, L. Xiao, L. Du, and L. Huang, "On selfish behavior in wireless sensor networks: a game theoretic case study," in Measuring Technology and Mechatronics Automation (ICMTMA), 2011 Third International Conference on, vol. 2. IEEE, 2011, pp. 752-756.
-
(2011)
Measuring Technology and Mechatronics Automation (ICMTMA), 2011 Third International Conference on
, vol.2
, pp. 752-756
-
-
Yan, M.1
Xiao, L.2
Du, L.3
Huang, L.4
-
89
-
-
62749191185
-
Noncooperative random access game via pricing in ad hoc networks
-
B. Yang, G. Feng, and X. Guan, "Noncooperative random access game via pricing in ad hoc networks," in Decision and Control, 2007 46th IEEE Conference on. IEEE, 2007, pp. 5704-5709.
-
(2007)
Decision and Control 2007 46th IEEE Conference On. IEEE
, pp. 5704-5709
-
-
Yang, B.1
Feng, G.2
Guan, X.3
-
90
-
-
70350576855
-
Noncooperative carrier sense game in wireless networks
-
K. Park, J. Hou, T. Basar, and H. Kim, "Noncooperative carrier sense game in wireless networks," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5280-5289, 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.10
, pp. 5280-5289
-
-
Park, K.1
Hou, J.2
Basar, T.3
Kim, H.4
-
91
-
-
77955852141
-
Optimal physical carrier sense in wireless networks
-
K. Park, J. Choi, J. Hou, Y. Hu, and H. Lim, "Optimal physical carrier sense in wireless networks," Ad Hoc Networks, vol. 9, no. 1, pp. 16-27, 2011.
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.1
, pp. 16-27
-
-
Park, K.1
Choi, J.2
Hou, J.3
Hu, Y.4
Lim, H.5
-
92
-
-
70349673038
-
Interference-aware mac protocol for wireless networks by a game-theoretic approach
-
H. Lee, H. Kwon, A. Motskin, and L. Guibas, "Interference-aware mac protocol for wireless networks by a game-theoretic approach," in INFOCOM 2009, IEEE. IEEE, 2009, pp. 1854-1862.
-
(2009)
INFOCOM 2009 IEEE. IEEE
, pp. 1854-1862
-
-
Lee, H.1
Kwon, H.2
Motskin, A.3
Guibas, L.4
-
93
-
-
79953132127
-
A game theoretic approach to mac design for infrastructure networks
-
I. Tinnirello, L. Giarŕe, and G. Neglia, "A game theoretic approach to mac design for infrastructure networks," in Decision and Control (CDC), 2010 49th IEEE Conference on. IEEE, 2010, pp. 1933-1938.
-
(2010)
Decision and Control (CDC) 2010 49th IEEE Conference On. IEEE
, pp. 1933-1938
-
-
Tinnirello, I.1
Giarŕe, L.2
Neglia, G.3
-
94
-
-
84866771167
-
Achieving fair bandwidth distribution in wifi networks: A game theoretical approach
-
I. Tinnirello, L. Giarr̀e, G. Neglia, E. Maestro, and I. Ḿediterrańee, "Achieving fair bandwidth distribution in wifi networks: A game theoretical approach," in 18th IFAC World Congress, 2011.
-
(2011)
18th IFAC World Congress
-
-
Tinnirello, I.1
Giarr̀e, L.2
Neglia, G.3
Maestro, E.4
Ḿ editerrańee, I.5
-
95
-
-
84860389547
-
Mac design for wifi infrastructure networks: A game-theoretic approach
-
I. Tinnirello, L. Giarŕe, and G. Neglia, "Mac design for wifi infrastructure networks: a game-theoretic approach," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2510-2522, 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.8
, pp. 2510-2522
-
-
Tinnirello, I.1
Giarŕe, L.2
Neglia, G.3
-
96
-
-
33947219764
-
A game-theoretic study of csma/ca under a backoff attack
-
J. Konorski, "A game-theoretic study of csma/ca under a backoff attack," IEEE/ACM Trans. Netw. (TON), vol. 14, no. 6, pp. 1167-1178, 2006.
-
(2006)
IEEE/ACM Trans. Netw. (TON)
, vol.14
, Issue.6
, pp. 1167-1178
-
-
Konorski, J.1
-
97
-
-
53549113084
-
Throughput-oriented mac for mobile ad hoc networks: A game-theoretic approach
-
F. Wang, O. Younis, and M. Krunz, "Throughput-oriented mac for mobile ad hoc networks: A game-theoretic approach," Ad Hoc Networks, vol. 7, no. 1, pp. 98-117, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.1
, pp. 98-117
-
-
Wang, F.1
Younis, O.2
Krunz, M.3
-
98
-
-
44049093286
-
Throughput-oriented mac for mobile networks with variable packet sizes
-
IEEE
-
F. Wang, O. Younis, and M. Kiunz, "Throughput-oriented mac for mobile networks with variable packet sizes," in Sensor and Ad Hoc Communications and Networks, 2006. SECON'06. 2006 3rd Annual IEEE Communications Society on, vol. 2. IEEE, 2006, pp. 421-430.
-
(2006)
Sensor and Ad Hoc Communications and Networks 2006. SECON'06. 2006 3rd Annual IEEE Communications Society on
, vol.2
, pp. 421-430
-
-
Wang, F.1
Younis, O.2
Kiunz, M.3
-
99
-
-
84886466376
-
Gmac: A game-theoretic mac protocol for mobile ad hoc networks
-
F. Wang, O. Younis, and M. Krunz, "Gmac: A game-theoretic mac protocol for mobile ad hoc networks," in Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2006 4th International Symposium on. IEEE, 2006, pp. 1-9.
-
(2006)
Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks 2006 4th International Symposium On. IEEE
, pp. 1-9
-
-
Wang, F.1
Younis, O.2
Krunz, M.3
-
100
-
-
77955308589
-
A non-cooperative game approach for power-aware mac in ad hoc wireless networks
-
A. Ghasemi and K. Faez, "A non-cooperative game approach for power-aware mac in ad hoc wireless networks," Computer Communications, vol. 33, no. 12, pp. 1440-1451, 2010.
-
(2010)
Computer Communications
, vol.33
, Issue.12
, pp. 1440-1451
-
-
Ghasemi, A.1
Faez, K.2
-
102
-
-
77957283007
-
Joint random access and power control game in ad hoc networks with noncooperative users
-
C. Long, Q. Chi, X. Guan, and T. Chen, "Joint random access and power control game in ad hoc networks with noncooperative users," Ad Hoc Networks, vol. 9, no. 2, pp. 142-151, 2011.
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.2
, pp. 142-151
-
-
Long, C.1
Chi, Q.2
Guan, X.3
Chen, T.4
-
103
-
-
80051613744
-
A cross-layer optimization for energyefficient mac protocol with delay and rate constraints
-
H. Kim, H. Lee, and S. Lee, "A cross-layer optimization for energyefficient mac protocol with delay and rate constraints," in Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. IEEE, 2011, pp. 2336-2339.
-
(2011)
Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference On. IEEE
, pp. 2336-2339
-
-
Kim, H.1
Lee, H.2
Lee, S.3
-
104
-
-
50249136193
-
Using game theory for power and rate control in wireless ad hoc networks
-
A. Lim and Y. Kado, "Using game theory for power and rate control in wireless ad hoc networks," in SICE, 2007 Annual Conference. IEEE, 2007, pp. 1166-1170.
-
(2007)
SICE 2007 Annual Conference. IEEE
, pp. 1166-1170
-
-
Lim, A.1
Kado, Y.2
-
106
-
-
33745290254
-
Cooperative and selfish behaviour in unlicensed spectrum using the csma/ca protocol
-
O. Queseth, "Cooperative and selfish behaviour in unlicensed spectrum using the csma/ca protocol," in Proc. Nordic Radio Symposium, 2004, pp. 404-408.
-
(2004)
Proc. Nordic Radio Symposium
, pp. 404-408
-
-
Queseth, O.1
-
107
-
-
84055193129
-
Game-theoretic approach against selfish attacks in cognitive radio networks
-
M. Yan, L. Du, L. Huang, L. Xiao, and J. Tang, "Game-theoretic approach against selfish attacks in cognitive radio networks," in Computer and Information Science (ICIS), 2011 IEEE/ACIS 10th International Conference on. IEEE, 2011, pp. 58-61.
-
Computer and Information Science (ICIS), 2011 IEEE/ACIS 10th International Conference On. IEEE
, Issue.2011
, pp. 58-61
-
-
Yan, M.1
Du, L.2
Huang, L.3
Xiao, L.4
Tang, J.5
-
108
-
-
70449492784
-
Random access protocols for wlans based on mechanism design
-
M. Cheung, A. Mohsenian-Rad, V. Wong, and R. Schober, "Random access protocols for wlans based on mechanism design," in Communications, 2009. ICC'09. IEEE International Conference on. IEEE, 2009, pp. 1-6.
-
(2009)
Communications 2009. ICC'09. IEEE International Conference On. IEEE
, pp. 1-6
-
-
Cheung, M.1
Mohsenian-Rad, A.2
Wong, V.3
Schober, R.4
-
109
-
-
33745305525
-
Playing csma/ca game to deter backoff attacks in ad hoc wireless lans
-
J. Konorski, "Playing csma/ca game to deter backoff attacks in ad hoc wireless lans," Ad-Hoc, Mobile, and Wireless Networks, pp. 127-140, 2005.
-
(2005)
Ad-Hoc, Mobile, and Wireless Networks
, pp. 127-140
-
-
Konorski, J.1
|