-
1
-
-
84863901332
-
IEEE 802.11, IEEE Standard for Information Technology Telecommunications and information exchange between systems local and metropolitan AREA networks specific requirements
-
PHY) specifications. ed: IEEE
-
I. W. Group. (2007). IEEE 802.11, IEEE Standard for Information Technology Telecommunications and information exchange between systems local and metropolitan AREA networks specific requirements. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. ed: IEEE.
-
(2007)
Part 11: Wireless LAN medium access control (MAC) and physical layer
-
-
-
2
-
-
53149091699
-
Modeling channel access delay and jitter of IEEE 802.11 DCF
-
Li, Y., Wang, C., Long, K., & Zhao, W. (2008). Modeling channel access delay and jitter of IEEE 802.11 DCF. Wireless Personal Communications,47, 417–440.
-
(2008)
Wireless Personal Communications
, vol.47
, pp. 417-440
-
-
Li, Y.1
Wang, C.2
Long, K.3
Zhao, W.4
-
3
-
-
84937637249
-
Data communication and computer networks. PHI Learning Pvt
-
Pal, A. (2013). Data communication and computer networks. PHI Learning Pvt. Ltd.
-
(2013)
Ltd
-
-
Pal, A.1
-
8
-
-
84937638008
-
Medium access control in wireless mesh networks
-
Misra S, Misra S, Woungang I, (eds), Springer, London
-
Huang, F., & Yang, Y. (2009). Medium access control in wireless mesh networks. In S. Misra, S. Misra, & I. Woungang (Eds.), Guide to wireless mesh networks (pp. 31–48). London: Springer.
-
(2009)
Guide to wireless mesh networks
, pp. 31-48
-
-
Huang, F.1
Yang, Y.2
-
9
-
-
84881476116
-
Game theory applications in CSMA methods
-
Ghazvini, M., Movahedinia, N., Jamshidi, K., & Moghim, N. (2013). Game theory applications in CSMA methods. Communications Surveys and Tutorials, IEEE,15, 1062–1087.
-
(2013)
Communications Surveys and Tutorials, IEEE
, vol.15
, pp. 1062-1087
-
-
Ghazvini, M.1
Movahedinia, N.2
Jamshidi, K.3
Moghim, N.4
-
11
-
-
84875679672
-
-
Bithas, P. S., Lioumpas, A. S. & Alexiou, A. (2012) A hybrid contention/reservation medium access protocol for wireless sensor networks. In Globecom Workshops (GC Wkshps) (pp. 1669–1674). 2012 IEEE
-
Bithas, P. S., Lioumpas, A. S. & Alexiou, A. (2012) A hybrid contention/reservation medium access protocol for wireless sensor networks. In Globecom Workshops (GC Wkshps) (pp. 1669–1674). 2012 IEEE.
-
-
-
-
12
-
-
84937638158
-
-
Shrestha, B., Hossain, E., & Choi, K. W. (2014). Distributed and centralized hybrid CSMA/CA-TDMA schemes for single-hop wireless networks. arXiv preprint arXiv:1401.5528.
-
(2014)
Distributed and centralized hybrid CSMA/CA-TDMA schemes for single-hop wireless networks. arXiv preprint arXiv
, vol.1401
, pp. 5528
-
-
Shrestha, B.1
Hossain, E.2
Choi, K.W.3
-
13
-
-
84885469151
-
Distributed sequential access MAC protocol for single-hop wireless networks
-
Lee, K.-S., & Kim, C. (2013). Distributed sequential access MAC protocol for single-hop wireless networks. Wireless Personal Communications,72, 2177–2184.
-
(2013)
Wireless Personal Communications
, vol.72
, pp. 2177-2184
-
-
Lee, K.-S.1
Kim, C.2
-
14
-
-
84894593660
-
A Beacon-based collision-free channel access scheme for IEEE 802.11 WLANs
-
Tuysuz, M., & Mantar, H. A. (2014). A Beacon-based collision-free channel access scheme for IEEE 802.11 WLANs. Wireless Personal Communications,75, 155–177.
-
(2014)
Wireless Personal Communications
, vol.75
, pp. 155-177
-
-
Tuysuz, M.1
Mantar, H.A.2
-
15
-
-
84055177555
-
A hybrid reservation/contention-based MAC for video streaming over wireless networks
-
Zhang, R., Ruby, R., Pan, J., Cai, L., & Shen, X. (2010). A hybrid reservation/contention-based MAC for video streaming over wireless networks. IEEE Journal on Selected Areas in Communications,28, 389–398.
-
(2010)
IEEE Journal on Selected Areas in Communications
, vol.28
, pp. 389-398
-
-
Zhang, R.1
Ruby, R.2
Pan, J.3
Cai, L.4
Shen, X.5
-
16
-
-
84897916050
-
Enhancing IEEE 802.11 MAC via a sender-initiated reservation
-
Lei, X., & Rhee, S. H. (2014). Enhancing IEEE 802.11 MAC via a sender-initiated reservation. Wireless Personal Communications,75, 2399–2409.
-
(2014)
Wireless Personal Communications
, vol.75
, pp. 2399-2409
-
-
Lei, X.1
Rhee, S.H.2
-
17
-
-
84904324488
-
Distributed and centralized hybrid CSMA/CA-TDMA schemes for single-hop wireless networks
-
Shrestha, B., Hossain, E., & Choi, K. W. (2014). Distributed and centralized hybrid CSMA/CA-TDMA schemes for single-hop wireless networks. IEEE Transactions on Wireless Communications,13, 4050–4065.
-
(2014)
IEEE Transactions on Wireless Communications
, vol.13
, pp. 4050-4065
-
-
Shrestha, B.1
Hossain, E.2
Choi, K.W.3
-
20
-
-
84903849235
-
-
Dang, D. N. M., Dang, H. N., Nguyen, V., Htike, Z., & Hong, C. S. (2014). HER-MAC: A hybrid efficient and reliable MAC for vehicular Ad Hoc networks. In 2014IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
-
Dang, D. N. M., Dang, H. N., Nguyen, V., Htike, Z., & Hong, C. S. (2014). HER-MAC: A hybrid efficient and reliable MAC for vehicular Ad Hoc networks. In 2014IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), (pp. 186–193).
-
-
-
-
21
-
-
84888305147
-
A novel hybrid slot allocation mechanism for 802.11 e EDCA protocol
-
Yao, X.-W., Wang, W.-L., Wu, T.-C., Yao, X.-M., & Yang, S.-H. (2014). A novel hybrid slot allocation mechanism for 802.11 e EDCA protocol. Information Processing Letters,114, 25–30.
-
(2014)
Information Processing Letters
, vol.114
, pp. 25-30
-
-
Yao, X.-W.1
Wang, W.-L.2
Wu, T.-C.3
Yao, X.-M.4
Yang, S.-H.5
-
22
-
-
84948970237
-
-
Wiley, London
-
Walke, B. H., Mangold, S., & Berlemann, L. (2006). IEEE 802 wireless systems: Protocols, multi-hop mesh/relaying, performance and spectrum coexistence. London: Wiley.
-
(2006)
IEEE 802 wireless systems: Protocols, multi-hop mesh/relaying, performance and spectrum coexistence
-
-
Walke, B.H.1
Mangold, S.2
Berlemann, L.3
-
23
-
-
84937636772
-
Carrier sense multiple access tuning parameters using game theory
-
Ghazvini, M., Movahedinia, N., & Jamshidi, K. (2012). Carrier sense multiple access tuning parameters using game theory. International Journal of Wireless and Mobile Networks (IJWMN),4, 259–268.
-
(2012)
International Journal of Wireless and Mobile Networks (IJWMN)
, vol.4
, pp. 259-268
-
-
Ghazvini, M.1
Movahedinia, N.2
Jamshidi, K.3
-
25
-
-
23944514713
-
A survey, classification and comparative analysis of medium access control protocols for ad hoc networks
-
Jurdak, R., Lopes, C. V., & Baldi, P. (2004). A survey, classification and comparative analysis of medium access control protocols for ad hoc networks. IEEE Communications Surveys and Tutorials,6, 2–16.
-
(2004)
IEEE Communications Surveys and Tutorials
, vol.6
, pp. 2-16
-
-
Jurdak, R.1
Lopes, C.V.2
Baldi, P.3
-
26
-
-
29644436745
-
Medium access control protocols for ad hoc wireless networks: A survey
-
Kumar, S., Raghavan, V. S., & Deng, J. (2006). Medium access control protocols for ad hoc wireless networks: A survey. Ad Hoc Networks,4, 326–358.
-
(2006)
Ad Hoc Networks
, vol.4
, pp. 326-358
-
-
Kumar, S.1
Raghavan, V.S.2
Deng, J.3
-
28
-
-
25644442524
-
On selfish behavior in CSMA/CA networks
-
Cagalj, M., Ganeriwal, S., Aad, I., & Hubaux, J. P. (2005). On selfish behavior in CSMA/CA networks. In 24th Annual Joint Conference of the IEEE Computer and Communications Societies (pp. 2513–2524).
-
(2005)
In 24th Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 2513-2524
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.P.4
-
29
-
-
84937634496
-
-
Odongo, O: Game theory and learning at the medium access control layer for distributed radio resource sharing in random access wireless networks
-
Ayienga, E., Opiyo, E., Manderick, B., & Odongo, O. (2013). Game theory and learning at the medium access control layer for distributed radio resource sharing in random access wireless networks.
-
(2013)
-
-
Ayienga, E.1
Opiyo, E.2
Manderick, B.3
-
32
-
-
84926132556
-
-
Cambridge University Press, Cambridge
-
Zhu Han, D. N., Saad, W., Başar, T., & Hjørungnes, A. (2011). Game theory in wireless and communication networks: Theory, models, and applications. Cambridge: Cambridge University Press.
-
(2011)
Game theory in wireless and communication networks: Theory, models, and applications
-
-
Zhu Han, D.N.1
Saad, W.2
Başar, T.3
Hjørungnes, A.4
-
35
-
-
78649475848
-
A survey on game theory applications in wireless networks
-
Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks. Computer Networks, 54, 3421–3430.
-
(2010)
Computer Networks
, vol.54
, pp. 3421-3430
-
-
Charilas, D.E.1
Panagopoulos, A.D.2
-
36
-
-
34548370980
-
Game theory in wireless networks: A tutorial,” Technical Report: LCA-REPORT-2006-002
-
Felegyhazi, M., & Hubaux, J. P. (2006). Game theory in wireless networks: A tutorial,” Technical Report: LCA-REPORT-2006-002, EPFL2006.
-
(2006)
EPFL2006
-
-
Felegyhazi, M.1
Hubaux, J.P.2
-
38
-
-
3142603471
-
Slotted ALOHA as a game with partial information
-
Altman, E., Azouzi, R. E., & Jiménez, T. (2004). Slotted ALOHA as a game with partial information. Computer Networks,45, 701–713.
-
(2004)
Computer Networks
, vol.45
, pp. 701-713
-
-
Altman, E.1
Azouzi, R.E.2
Jiménez, T.3
-
39
-
-
84937638126
-
-
MacKenzie, A. B., & DaSilva, L. A. (20060). game theory for wireless engineers. Morgan & Claypool
-
MacKenzie, A. B., & DaSilva, L. A. (20060). game theory for wireless engineers. Morgan & Claypool.
-
-
-
-
40
-
-
0035508757
-
Game theory and the design of self-configuring, adaptive wireless networks
-
MacKenzie, A. B., & Wicker, S. B. (2001). Game theory and the design of self-configuring, adaptive wireless networks. IEEE Communications Magazine,39, 126–131.
-
(2001)
IEEE Communications Magazine
, vol.39
, pp. 126-131
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
43
-
-
84877018154
-
Application of game theory to wireless networks. In Crisan, M
-
Convergence and Hybrid Information Technologies, InTech
-
Mehta, S., & Kwak, K. S. (2010). Application of game theory to wireless networks. In Crisan, M. (Ed.), Convergence and Hybrid Information Technologies, InTech.
-
(2010)
(Ed.)
-
-
Mehta, S.1
Kwak, K.S.2
-
44
-
-
34548132722
-
Using game theory to analyze wireless ad hoc networks
-
Srivastava, V., Neel, J., MacKenzie, A. B., Menon, R., DaSilva, L. A., Hicks, J. E., et al. (2005). Using game theory to analyze wireless ad hoc networks. IEEE Commun. Surv. Tutorials,7, 46–56.
-
(2005)
IEEE Commun. Surv. Tutorials
, vol.7
, pp. 46-56
-
-
Srivastava, V.1
Neel, J.2
MacKenzie, A.B.3
Menon, R.4
DaSilva, L.A.5
Hicks, J.E.6
-
45
-
-
34548132722
-
Using game theory to analyze wireless ad hoc networks
-
Srivastava, V., Neel, J., MacKenzie, A. B., Menon, R., DaSilva, L. A., Hicks, J. E., et al. (2005). Using game theory to analyze wireless ad hoc networks. Communications Surveys & Tutorials, IEEE,7, 46–56.
-
(2005)
Communications Surveys & Tutorials, IEEE
, vol.7
, pp. 46-56
-
-
Srivastava, V.1
Neel, J.2
MacKenzie, A.B.3
Menon, R.4
DaSilva, L.A.5
Hicks, J.E.6
-
46
-
-
80053241965
-
Game theoretic approaches for multiple access in wireless networks: A survey
-
Akkarajitsakul, K., Hossain, E., Niyato, D., & Kim, D. (2011). Game theoretic approaches for multiple access in wireless networks: A survey. IEEE Communication Surveys Tutorials,13, 372–395.
-
(2011)
IEEE Communication Surveys Tutorials
, vol.13
, pp. 372-395
-
-
Akkarajitsakul, K.1
Hossain, E.2
Niyato, D.3
Kim, D.4
-
47
-
-
84923105588
-
A game-theoretic model for medium access control
-
Austin: Texas
-
Chen, L., Cui, T., Low, S. H., & Doyle, J. C. (2007). A game-theoretic model for medium access control, in WICON’07, Austin, Texas.
-
(2007)
in WICON’07
-
-
Chen, L.1
Cui, T.2
Low, S.H.3
Doyle, J.C.4
-
48
-
-
50649099699
-
A game theoretic framework of distributed power and rate control in IEEE 802.11 WLANs
-
Chen, L., & Leneutre, J. (2008). A game theoretic framework of distributed power and rate control in IEEE 802.11 WLANs. IEEE Journal on Selected Areas in Communications,26, 1128–1137.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, pp. 1128-1137
-
-
Chen, L.1
Leneutre, J.2
-
49
-
-
84881480551
-
Application of game theory in wireless communication networks
-
Dissertation: Dept. Elec. and Comp. Eng. University of British Columbia
-
Huang, W. (2012). Application of game theory in wireless communication networks. Ph.D. Dissertation, Dept. Elec. and Comp. Eng. University of British Columbia.
-
(2012)
Ph.D
-
-
Huang, W.1
-
50
-
-
84881476900
-
A taxonomy of game theoretic approaches against attacks in wireless ad hoc networks
-
Kokura, Japan
-
Liao, X., Hao, D., & Sakurai, K. (2011). A taxonomy of game theoretic approaches against attacks in wireless ad hoc networks. Presented at the Symposium on Cryptography and Information Security. Kokura, Japan.
-
(2011)
Presented at the Symposium on Cryptography and Information Security
-
-
Liao, X.1
Hao, D.2
Sakurai, K.3
-
51
-
-
26444461958
-
Applications of game theory in ad hoc networks. M.Sc. Thesis, Dept
-
PHYS and MTH: Helsinki UNIV. of Tech
-
Leino, J. (2003). Applications of game theory in ad hoc networks. M.Sc. Thesis, Dept. Eng. PHYS and MTH, Helsinki UNIV. of Tech.
-
(2003)
Eng
-
-
Leino, J.1
-
52
-
-
80051757197
-
Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game
-
Akkarajitsakul, K., Hossain, E., & Niyato, D. (2011). Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game. IEEE Communications Magazine,49, 120–127.
-
(2011)
IEEE Communications Magazine
, vol.49
, pp. 120-127
-
-
Akkarajitsakul, K.1
Hossain, E.2
Niyato, D.3
-
53
-
-
84937629764
-
Network games: Theory, models
-
Morgan &, Claypool
-
Menache, I., & Ozdaglar, A. (2011). Network games: Theory, models, and dynamics. Morgan & Claypool.
-
(2011)
and dynamics
-
-
Menache, I.1
Ozdaglar, A.2
-
54
-
-
84937637026
-
-
Game theory and learning for wireless networks: Fundamentals and applications. Academic Press
-
Lasaulce, S., & Tembine, H. (2011). Game theory and learning for wireless networks: Fundamentals and applications. Academic Press.
-
(2011)
& Tembine, H
-
-
Lasaulce, S.1
-
58
-
-
14844282678
-
On cheating in CSMA/CA ad hoc networks
-
Cagalj, M., Ganeriwal, S. Aad, I., & Hubaux, J. P. (2004). On cheating in CSMA/CA ad hoc networks. In IEEE INFOCOM 2005.
-
(2004)
In IEEE INFOCOM
, pp. 2005
-
-
Cagalj, M.1
Ganeriwal, S.A.2
-
59
-
-
67449097488
-
Modelling IEEE 802.11 DCF in wireless LANs as a dynamic game with incompletely information. In IET International Conference on Wireless, Mobile and Multimedia Networks, Mumbai
-
Zhang, G., & Zhang, H. (2008). Modelling IEEE 802.11 DCF in wireless LANs as a dynamic game with incompletely information. In IET International Conference on Wireless, Mobile and Multimedia Networks, Mumbai, India (pp. 215–218).
-
(2008)
India
, pp. 215-218
-
-
Zhang, G.1
Zhang, H.2
-
60
-
-
62449251420
-
A novel MAC scheme for wireless LANs from the perspective of game theory. In IET Conference on Wireless, Mobile and Sensor Networks, (CCWMSN07)., Shanghai
-
Zhang, G., Zhang, H., & Zhao, L. (2007). A novel MAC scheme for wireless LANs from the perspective of game theory. In IET Conference on Wireless, Mobile and Sensor Networks, (CCWMSN07)., Shanghai, China (pp. 112–116).
-
(2007)
China
, pp. 112-116
-
-
Zhang, G.1
Zhang, H.2
Zhao, L.3
-
61
-
-
17744372911
-
Game theory models for IEEE 802.11 DCF in wireless ad hoc networks
-
Xiao, Y., Shan, X., & Ren, Y. (2005). Game theory models for IEEE 802.11 DCF in wireless ad hoc networks. IEEE Communications Magazine,43, S22–S26.
-
(2005)
IEEE Communications Magazine
, vol.43
, pp. 22-26
-
-
Xiao, Y.1
Shan, X.2
Ren, Y.3
-
62
-
-
60849097114
-
Contention control: A game-theoretic approach. In 46th IEEE Conference on Decision and Control, New Orleans
-
Chen, L., Low, S. H., & Doyle, J. C. (2007). Contention control: A game-theoretic approach. In 46th IEEE Conference on Decision and Control, New Orleans, LA, (pp. 3428–3434).
-
(2007)
LA
, pp. 3428-3434
-
-
Chen, L.1
Low, S.H.2
Doyle, J.C.3
-
63
-
-
50649091148
-
A game-theoretic framework for medium access control
-
Cui, T., Chen, L., & Low, S. (2008). A game-theoretic framework for medium access control. IEEE Journal on Selected Areas in Communications,26, 1116–1127.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, pp. 1116-1127
-
-
Cui, T.1
Chen, L.2
Low, S.3
-
64
-
-
34547232500
-
Random access in wireless ad hoc networks for throughput maximization. In 9th International Conference on Control, Automation, Robotics and Vision
-
Yang, B., Feng, G., & Guan, X. (2006). Random access in wireless ad hoc networks for throughput maximization. In 9th International Conference on Control, Automation, Robotics and Vision, ICARCV ‘06., (pp. 1–6).
-
(2006)
ICARCV ‘06.
-
-
Yang, B.1
Feng, G.2
Guan, X.3
-
65
-
-
84881475481
-
Random access game in ad hoc networks with cooperative and noncooperative users
-
Guan, X., Yang, B., Feng, G., & Long, C. (2008). Random access game in ad hoc networks with cooperative and noncooperative users. International Journal Systems, Control Communications,1, 13–30.
-
(2008)
International Journal Systems, Control Communications
, vol.1
, pp. 13-30
-
-
Guan, X.1
Yang, B.2
Feng, G.3
Long, C.4
-
67
-
-
4143121200
-
Design and implementation of a MAC scheme for wireless ad-hoc networks based on a cooperative game framework
-
Fang, Z., & Bensaou, B.(2004). Design and implementation of a MAC scheme for wireless ad-hoc networks based on a cooperative game framework. In IEEE International Conference on Communications (pp. 4034–4038).
-
(2004)
In IEEE International Conference on Communications
, pp. 4034-4038
-
-
Fang, Z.1
Bensaou, B.2
-
68
-
-
77955301143
-
An energy-efficient MAC protocol in wireless sensor networks: A game theoretic approach
-
Mehta, S., & Kwak, K. S. (2010). An energy-efficient MAC protocol in wireless sensor networks: A game theoretic approach. EURASIP Journal on Wireless Communications and Networking,2010, 17.
-
(2010)
EURASIP Journal on Wireless Communications and Networking
, vol.2010
, pp. 17
-
-
Mehta, S.1
Kwak, K.S.2
-
69
-
-
51649111480
-
Using incompletely cooperative game theory in wireless sensor networks
-
Zhao, L., Zhang, H., & Zhang, J. (2008). Using incompletely cooperative game theory in wireless sensor networks. Wireless Communications and Networking Conference, WCNC,2008, 1483–1488.
-
(2008)
Wireless Communications and Networking Conference, WCNC
, vol.2008
, pp. 1483-1488
-
-
Zhao, L.1
Zhang, H.2
Zhang, J.3
-
70
-
-
52649131900
-
Selfish traffic with rational nodes in WLANs
-
Zhao, L., Zhang, H., & Zhang, J. (2008). Selfish traffic with rational nodes in WLANs. IEEE Communications Letters,12, 645–647.
-
(2008)
IEEE Communications Letters
, vol.12
, pp. 645-647
-
-
Zhao, L.1
Zhang, H.2
Zhang, J.3
-
71
-
-
38549089684
-
Using incompletely cooperative game theory in mobile ad hoc networks
-
Zhao, L., Zhang, J., Yang, K., & Zhang, H. (2007). Using incompletely cooperative game theory in mobile ad hoc networks. In IEEE International Conference on Communications,ICC ‘07 (pp. 3401–3406).
-
(2007)
In IEEE International Conference on Communications,ICC ‘07
, pp. 3401-3406
-
-
Zhao, L.1
Zhang, J.2
Yang, K.3
Zhang, H.4
-
72
-
-
39549111441
-
Using incompletely cooperative game theory in wireless mesh networks
-
Zhao, L., Zhang, J., & Zhang, H. (2008). Using incompletely cooperative game theory in wireless mesh networks. IEEE Network,22, 39–44.
-
(2008)
IEEE Network
, vol.22
, pp. 39-44
-
-
Zhao, L.1
Zhang, J.2
Zhang, H.3
-
73
-
-
52949099188
-
Game-theoretic cross-layer design in WLANs. In International Wireless Communications and Mobile Computing Conference
-
Zhao, L., Zou, X., Zhang, H., Ding, W., & Zhang, J. (2008). Game-theoretic cross-layer design in WLANs. In International Wireless Communications and Mobile Computing Conference, IWCMC ‘08 (pp. 570–575).
-
(2008)
IWCMC ‘08
, pp. 570-575
-
-
Zhao, L.1
Zou, X.2
Zhang, H.3
Ding, W.4
Zhang, J.5
-
74
-
-
67651236676
-
Game-theoretic medium access control protocol for wireless sensor networks
-
Zhao, L., Guo, L., Zhang, J., & Zhang, H. (2009). Game-theoretic medium access control protocol for wireless sensor networks. IET Communications,3, 1274–1283.
-
(2009)
IET Communications
, vol.3
, pp. 1274-1283
-
-
Zhao, L.1
Guo, L.2
Zhang, J.3
Zhang, H.4
-
75
-
-
62949176323
-
An energy-efficient MAC protocol for WSNs: Game-theoretic constraint optimization. In 11th International Conference on Communication Systems
-
Zhao, L., Guo, L., Zhang G., Zhang, H., & Yang, K. (2008). An energy-efficient MAC protocol for WSNs: Game-theoretic constraint optimization. In 11th International Conference on Communication Systems, ICCS. (pp. 114–118).
-
(2008)
ICCS
, pp. 114-118
-
-
Zhao, L.1
Guo, L.2
Zhang, G.3
Zhang, H.4
Yang, K.5
-
76
-
-
79955066038
-
An energy-efficient MAC protocol for WSNs: Game-theoretic constraint optimization with multiple objectives
-
Zhao, L., Guo, L., Cong, L., & Zhang, H. (2009). An energy-efficient MAC protocol for WSNs: Game-theoretic constraint optimization with multiple objectives. Wireless Sensor Networks,1, 358–364.
-
(2009)
Wireless Sensor Networks
, vol.1
, pp. 358-364
-
-
Zhao, L.1
Guo, L.2
Cong, L.3
Zhang, H.4
-
77
-
-
58149141336
-
Game-theoretic EDCA in IEEE 802.11e WLANs. In IEEE 68th Vehicular Technology Conference,VTC Calgary
-
Zhao, L., Cong, L., Zhang, H., Ding, W., & Zhang, J. (2008). Game-theoretic EDCA in IEEE 802.11e WLANs. In IEEE 68th Vehicular Technology Conference,VTC Calgary, BC (pp. 1–5).
-
(2008)
BC
-
-
Zhao, L.1
Cong, L.2
Zhang, H.3
Ding, W.4
Zhang, J.5
-
78
-
-
78649894384
-
-
Jin, Y., Miao, H., Liu, H., & Xiong, Y. (2009). An improved backoff algorithm for wireless sensor network based on game theory. In IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009), Shanghai, China (pp. 197–200).
-
(2009)
Shanghai, China
, pp. 197-200
-
-
-
79
-
-
84884343990
-
A game theory based contention window adjustment for
-
Ghazvini, M., Movahedinia, N., & Jamshidi, K. (2013). A game theory based contention window adjustment for IEEE 802.11 under heavy load. International Journal of Communication Networks and Information Security (IJCNIS), 5, 93–103.
-
(2013)
IEEE 802.11 under heavy load. International Journal of Communication Networks and Information Security (IJCNIS)
, vol.5
, pp. 93-103
-
-
Ghazvini, M.1
Movahedinia, N.2
Jamshidi, K.3
-
80
-
-
33847307810
-
Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs
-
Heusse, M., Rousseau, F., Guillier, R., & Duda, A. (2005). Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs. ACM SIGCOMM Computer Communication Review,35, 121–132.
-
(2005)
ACM SIGCOMM Computer Communication Review
, vol.35
, pp. 121-132
-
-
Heusse, M.1
Rousseau, F.2
Guillier, R.3
Duda, A.4
-
81
-
-
70349984358
-
On selfish and malicious behaviors in wireless networks—A non-cooperative game theoretic approach. Ph.D
-
Ecole Nationale Superieure des Telecommunications, Paris
-
Chen, L. (2008). On selfish and malicious behaviors in wireless networks—A non-cooperative game theoretic approach. Ph.D. dissertation, Ecole Nationale Superieure des Telecommunications, Paris.
-
(2008)
dissertation
-
-
Chen, L.1
-
82
-
-
85032750911
-
Medium access in WiFi networks: Strategies of selfish nodes
-
Tinnirello, I., Giarre, L., & Neglia, G. (2009). Medium access in WiFi networks: Strategies of selfish nodes. IEEE Signal Processing Magazine,26, 124–128.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, pp. 124-128
-
-
Tinnirello, I.1
Giarre, L.2
Neglia, G.3
-
83
-
-
77955769561
-
Random access game and medium access control design
-
Chen, L., Low, S. H., & Doyle, J. C. (2010). Random access game and medium access control design. IEEE/ACM Transactions on Networking,18, 1303–1316.
-
(2010)
IEEE/ACM Transactions on Networking
, vol.18
, pp. 1303-1316
-
-
Chen, L.1
Low, S.H.2
Doyle, J.C.3
-
84
-
-
77951292719
-
Efficient medium access control design for autonomous wireless networks—A game theoretic approach. In 34th Conference on Local Computer Networks, LCN 2009
-
Chen, L., & Leneutre, J. (2009). Efficient medium access control design for autonomous wireless networks—A game theoretic approach. In 34th Conference on Local Computer Networks, LCN 2009., Zurich (pp. 376–383).
-
(2009)
Zurich
, pp. 376-383
-
-
Chen, L.1
Leneutre, J.2
-
85
-
-
84886466376
-
GMAC: A game-theoretic MAC protocol for mobile ad hoc networks. In 4th International Symposium on Modeling and Optimization in Mobile
-
Wang, F., Younis, O. & Krunz, M. (2006). GMAC: A game-theoretic MAC protocol for mobile ad hoc networks. In 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (pp. 1–9).
-
(2006)
Ad Hoc and Wireless Networks
-
-
Wang, F.1
Younis, O.2
Krunz, M.3
-
86
-
-
63049122215
-
Improved performance with novel utility functions in a game-theoretic model of medium access control in wireless networks
-
Sanyal, D. K., Chattopadhyay, M., & Chattopadhyay, S. (2008). Improved performance with novel utility functions in a game-theoretic model of medium access control in wireless networks. In IEEE Region 10 Conference,TENCON Hyderabad (pp. 1–6).
-
(2008)
In IEEE Region 10 Conference,TENCON Hyderabad
-
-
Sanyal, D.K.1
Chattopadhyay, M.2
Chattopadhyay, S.3
-
87
-
-
78651527760
-
Performance improvement of wireless MAC using non-cooperative games
-
Sanyal, D. K., Chattopadhyay, M., & Chattopadhyay, S. (2009). Performance improvement of wireless MAC using non-cooperative games. Adv. Ele. Eng. Comput. Sci.,39, 207–218.
-
(2009)
Adv. Ele. Eng. Comput. Sci.
, vol.39
, pp. 207-218
-
-
Sanyal, D.K.1
Chattopadhyay, M.2
Chattopadhyay, S.3
-
88
-
-
58049130861
-
Contention access game method in wireless ad-hoc networks. In 4th International Conference on Wireless Communications, Networking and Mobile Computing
-
He, X., & Tan, L. (2008). Contention access game method in wireless ad-hoc networks. In 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM ‘08 (pp. 1–4).
-
(2008)
WiCOM ‘08
-
-
He, X.1
Tan, L.2
-
89
-
-
34547412444
-
Distributed contention window control for selfish users in IEEE 802.11 wireless LANs
-
Jin, Y., & Kesidis, G. (2007). Distributed contention window control for selfish users in IEEE 802.11 wireless LANs. IEEE Journal on Selected Areas in Communications,25, 1113–1123.
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, pp. 1113-1123
-
-
Jin, Y.1
Kesidis, G.2
-
91
-
-
77954479354
-
Two rounds game CSMA algorithm of WSNs. In 2nd International Conference on Networking and Digital Society (ICNDS)
-
Yang, J., & Shi, H. (2010). Two rounds game CSMA algorithm of WSNs. In 2nd International Conference on Networking and Digital Society (ICNDS), Wenzhou (pp. 270–273).
-
(2010)
Wenzhou
, pp. 270-273
-
-
Yang, J.1
Shi, H.2
-
92
-
-
84902297076
-
Game-theory model based on carrier sense multiple access protocol in wireless network
-
Tian, J. (2014). Game-theory model based on carrier sense multiple access protocol in wireless network. Journal of Networks,9, 1603–1609.
-
(2014)
Journal of Networks
, vol.9
, pp. 1603-1609
-
-
Tian, J.1
-
93
-
-
28244481387
-
Fair bandwidth sharing in distributed systems: A game-theoretic approach
-
Rakshit, S., & Guha, R. K. (2005). Fair bandwidth sharing in distributed systems: A game-theoretic approach. IEEE Transactions on Computers,54, 1384–1393.
-
(2005)
IEEE Transactions on Computers
, vol.54
, pp. 1384-1393
-
-
Rakshit, S.1
Guha, R.K.2
-
94
-
-
79952946630
-
On selfish behavior in wireless sensor networks: A game theoretic case study. In Third International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
-
Yan, M., Xiao, L., Du, L., & Huang, L. (2011). On selfish behavior in wireless sensor networks: A game theoretic case study. In Third International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), Shangshai (pp. 752–756).
-
(2011)
Shangshai
, pp. 752-756
-
-
Yan, M.1
Xiao, L.2
Du, L.3
Huang, L.4
-
95
-
-
62749191185
-
Noncooperative random access game via pricing in ad hoc networks. In 46th IEEE Conference on Decision and Control
-
Yang, B., Feng, G., & Guan, X. (2007). Noncooperative random access game via pricing in ad hoc networks. In 46th IEEE Conference on Decision and Control, New Orleans, (pp. 5704–5709).
-
(2007)
New Orleans
, pp. 5704-5709
-
-
Yang, B.1
Feng, G.2
Guan, X.3
-
96
-
-
70350576855
-
Noncooperative carrier sense game in wireless networks
-
Park, K. J., Hou, J., Basar, T., & Kim, H. (2009). Noncooperative carrier sense game in wireless networks. IEEE Transactions on Wireless Communications,8, 5280–5289.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, pp. 5280-5289
-
-
Park, K.J.1
Hou, J.2
Basar, T.3
Kim, H.4
-
97
-
-
77955852141
-
Optimal physical carrier sense in wireless networks
-
Park, K. J., Choi, J., Hou, J. C., Hu, Y. C., & Lim, H. (2011). Optimal physical carrier sense in wireless networks. Ad Hoc Networks,9, 16–27.
-
(2011)
Ad Hoc Networks
, vol.9
, pp. 16-27
-
-
Park, K.J.1
Choi, J.2
Hou, J.C.3
Hu, Y.C.4
Lim, H.5
-
98
-
-
70349673038
-
Interference-aware MAC protocol for wireless networks by a game-theoretic approach. In INFOCOM ‘09
-
Lee, H. J., Kwon, H., Motskin, A., & Guibas, L. (2009). Interference-aware MAC protocol for wireless networks by a game-theoretic approach. In INFOCOM ‘09, Rio de Janeiro (pp. 1854–1862).
-
(2009)
Rio de Janeiro
, pp. 1854-1862
-
-
Lee, H.J.1
Kwon, H.2
Motskin, A.3
Guibas, L.4
-
99
-
-
79953132127
-
A game theoretic approach to MAC design for infrastructure networks. Presented at the 49th IEEE Conference on Decision and Control (CDC)
-
Tinnirello, I., Giarre, L., & Neglia, G. (2010). A game theoretic approach to MAC design for infrastructure networks. Presented at the 49th IEEE Conference on Decision and Control (CDC), USA.
-
(2010)
USA
-
-
Tinnirello, I.1
Giarre, L.2
Neglia, G.3
-
100
-
-
84866771167
-
Achieving fair bandwidth distribution in WiFi networks: A game theoretical approach
-
Milan, Italy
-
Tinnirello, I., Giarre, L., & Neglia, G. (2011). Achieving fair bandwidth distribution in WiFi networks: A game theoretical approach. Presented at the 18th IFAC World Congress, Milan, Italy.
-
(2011)
Presented at the 18th IFAC World Congress
-
-
Tinnirello, I.1
Giarre, L.2
Neglia, G.3
-
102
-
-
33947219764
-
A game-theoretic study of CSMA/CA under a backoff attack
-
Konorski, J. (2006). A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Transactions on Networking,14, 1167–1178.
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, pp. 1167-1178
-
-
Konorski, J.1
-
103
-
-
84877022694
-
GTXOP: A game theoretic approach for QoS provisioning using transmission opportunity tuning
-
Ghazvini, M., Movahedinia, N., & Jamshidi, K. (2013). GTXOP: A game theoretic approach for QoS provisioning using transmission opportunity tuning. PLoS ONE,8, e62925.
-
(2013)
PLoS ONE
, vol.8
, pp. 62925
-
-
Ghazvini, M.1
Movahedinia, N.2
Jamshidi, K.3
-
104
-
-
44049093286
-
SECON ‘06, Reston
-
Wang,F., Younis, O., & Kiunz, M. (2007). Throughput-oriented MAC for mobile networks with variable packet sizes. In 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006. SECON ‘06, Reston, VA (pp. 421–430).
-
(2006)
VA
, pp. 421-430
-
-
-
105
-
-
53549113084
-
Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach
-
Wang, F., Younis, O., & Krunz, M. (2009). Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach. Ad Hoc Networks,7, 98–117.
-
(2009)
Ad Hoc Networks
, vol.7
, pp. 98-117
-
-
Wang, F.1
Younis, O.2
Krunz, M.3
-
106
-
-
69949178261
-
A nash power-aware MAC game for ad hoc wireless networks. In IEEE 19th International Symposium on Personal
-
Ghasemi, A., & Faez, K. (2008). A nash power-aware MAC game for ad hoc wireless networks. In IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) (pp. 1–5).
-
(2008)
Indoor and Mobile Radio Communications (PIMRC)
-
-
Ghasemi, A.1
Faez, K.2
-
107
-
-
77955308589
-
A non-cooperative game approach for power-aware MAC in ad hoc wireless networks
-
Ghasemi, A., & Faez, K. (2010). A non-cooperative game approach for power-aware MAC in ad hoc wireless networks. Computer Communications,33, 1440–1451.
-
(2010)
Computer Communications
, vol.33
, pp. 1440-1451
-
-
Ghasemi, A.1
Faez, K.2
-
108
-
-
77957283007
-
Joint random access and power control game in ad hoc networks with noncooperative users
-
Long, C., Chi, Q., Guan, X., & Chen, T. (2011). Joint random access and power control game in ad hoc networks with noncooperative users. Ad Hoc Networks,9, 142–151.
-
(2011)
Ad Hoc Networks
, vol.9
, pp. 142-151
-
-
Long, C.1
Chi, Q.2
Guan, X.3
Chen, T.4
-
109
-
-
80051613744
-
A cross-layer optimization for energy-efficient MAC protocol with delay and rate constraints. In International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
Kim, H., Lee, H. & Lee, S. (2011). A cross-layer optimization for energy-efficient MAC protocol with delay and rate constraints. In International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague (pp. 2336–2339).
-
(2011)
Prague
, pp. 2336-2339
-
-
Kim, H.1
Lee, H.2
Lee, S.3
-
110
-
-
50249136193
-
Using game theory for power and rate control in wireless ad hoc networks
-
Lim, A. O. & Kado, Y. (2007). Using game theory for power and rate control in wireless ad hoc networks. In SICE Annual Conference Takamatsu (pp. 1166–1170).
-
(2007)
In SICE Annual Conference Takamatsu
, pp. 1166-1170
-
-
Lim, A.O.1
Kado, Y.2
-
112
-
-
84874646930
-
The performance evaluation of IEEE 802.11 e for QoS support in wireless LANs
-
Yao, Y.-C., Wen, J.-H., & Weng, C.-E. (2013). The performance evaluation of IEEE 802.11 e for QoS support in wireless LANs. Wireless Personal Communications,69, 413–425.
-
(2013)
Wireless Personal Communications
, vol.69
, pp. 413-425
-
-
Yao, Y.-C.1
Wen, J.-H.2
Weng, C.-E.3
-
114
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications,18, 535–547.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, pp. 535-547
-
-
Bianchi, G.1
-
115
-
-
0037082689
-
CSMA/CA performance under high traffic conditions: Throughput and delay analysis
-
Ziouva, E., & Antonakopoulos, T. (2002). CSMA/CA performance under high traffic conditions: Throughput and delay analysis. Computer Communications,25, 313–321.
-
(2002)
Computer Communications
, vol.25
, pp. 313-321
-
-
Ziouva, E.1
Antonakopoulos, T.2
-
116
-
-
24344482067
-
Throughput analysis and admission control for IEEE 802.11 a
-
Ergen, M., & Varaiya, P. (2005). Throughput analysis and admission control for IEEE 802.11 a. Mobile networks and Applications,10, 705–716.
-
(2005)
Mobile networks and Applications
, vol.10
, pp. 705-716
-
-
Ergen, M.1
Varaiya, P.2
-
118
-
-
0032292315
-
IEEE 802.11-saturation throughput analysis
-
Bianchi, G. (1998). IEEE 802.11-saturation throughput analysis. Communications Letters, IEEE,2, 318–320.
-
(1998)
Communications Letters, IEEE
, vol.2
, pp. 318-320
-
-
Bianchi, G.1
-
119
-
-
4143128895
-
-
Chatzimisios, P., Boucouvalas, A. C., & Vitsas, V. (2004). Performance analysis of IEEE 802.11 DCF in presence of transmission errors. Presented at the International Conference on Communications
-
Chatzimisios, P., Boucouvalas, A. C., & Vitsas, V. (2004). Performance analysis of IEEE 802.11 DCF in presence of transmission errors. Presented at the International Conference on Communications.
-
-
-
-
120
-
-
0041438376
-
-
Bianchi, G., & Tinnirello, I. (2003). Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network. In INFOCOM’03
-
Bianchi, G., & Tinnirello, I. (2003). Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network. In INFOCOM’03.
-
-
-
-
121
-
-
85008537091
-
Batch and sequential bayesian estimators of the number of active terminals in an IEEE 802.11 network
-
Vercauteren, T., Toledo, A. L., & Wang, X. (2007). Batch and sequential bayesian estimators of the number of active terminals in an IEEE 802.11 network. IEEE Transactions on Signal Processing,55, 437–450.
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, pp. 437-450
-
-
Vercauteren, T.1
Toledo, A.L.2
Wang, X.3
-
125
-
-
84873910611
-
On the linear weighted sum method for multi-objective optimization
-
Stanimirovic, I. P., Zlatanovic, M. L., & Petkovic, M. D. (2011). On the linear weighted sum method for multi-objective optimization. Facta Acta Universitatis,26, 49–63.
-
(2011)
Facta Acta Universitatis
, vol.26
, pp. 49-63
-
-
Stanimirovic, I.P.1
Zlatanovic, M.L.2
Petkovic, M.D.3
-
126
-
-
0032220912
-
The Nash bargaining solution for decision weight utility functions
-
Houba, H., Tieman, A. F., & Brinksma, R. (1998). The Nash bargaining solution for decision weight utility functions. Economics Letters,60, 41–48.
-
(1998)
Economics Letters
, vol.60
, pp. 41-48
-
-
Houba, H.1
Tieman, A.F.2
Brinksma, R.3
-
127
-
-
84937640831
-
A tutorial on the proof of the existence of Nash equilibria. University of British Columbia Technical Report TR-2007-25
-
Jiang, A. X., & Leyton-Brown, K. (2009). A tutorial on the proof of the existence of Nash equilibria. University of British Columbia Technical Report TR-2007-25. pdf.
-
(2009)
pdf
-
-
Jiang, A.X.1
Leyton-Brown, K.2
-
128
-
-
33947614090
-
-
Tanaka, K., & Kondo, E. (2005). A sample-based approach to lookup table construction by SVM active learning. In 2005 IEEE International Conference onRobotics and Biomimetics (ROBIO)
-
Tanaka, K., & Kondo, E. (2005). A sample-based approach to lookup table construction by SVM active learning. In 2005 IEEE International Conference onRobotics and Biomimetics (ROBIO) (pp. 628–633).
-
-
-
-
129
-
-
84937627726
-
The art of assembly language, 2nd Edition
-
Hyde, R. (2010) The art of assembly language, 2nd Edition. No Starch Press.
-
(2010)
No Starch Press
-
-
Hyde, R.1
|