Wireless physical layer network coding in potential presence of malicious relays – incomplete information game approach
暂无分享,去创建一个
[1] Yao-Win Peter Hong,et al. A Game Theoretic Approach for the Cooperative Network with the Presence of Malicious Relays , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[2] Alister G. Burr,et al. Layered Design of Hierarchical Exclusive Codebook and Its Capacity Regions for HDF Strategy in Parametric Wireless 2-WRC , 2011, IEEE Transactions on Vehicular Technology.
[3] Nasir D. Memon,et al. Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[4] Mainak Chatterjee,et al. Coexistence with malicious nodes: A game theoretic approach , 2009, 2009 International Conference on Game Theory for Networks.
[5] Toshiaki Koike-Akino,et al. Optimized constellations for two-way wireless relaying with physical network coding , 2009, IEEE Journal on Selected Areas in Communications.
[6] Michael Gastpar,et al. Compute-and-Forward: Harnessing Interference Through Structured Codes , 2009, IEEE Transactions on Information Theory.
[7] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[8] Armin Wittneben,et al. Achievable Rate Regions for the Two-way Relay Channel , 2006, 2006 IEEE International Symposium on Information Theory.
[9] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[10] Muriel Médard,et al. XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.