暂无分享,去创建一个
[1] Lin Chen,et al. Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[2] V. Georgiev. Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .
[3] Yoav Shoham,et al. Essentials of Game Theory: A Concise Multidisciplinary Introduction , 2008, Essentials of Game Theory: A Concise Multidisciplinary Introduction.
[4] Jens Grossklags,et al. Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance , 2012, WEIS.
[5] Colin Camerer. Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .
[6] Michael P. Wellman,et al. Incentivizing Responsible Networking via Introduction-Based Routing , 2011, TRUST.
[7] Walid Saad,et al. Game Theory in Wireless and Communication Networks: Applications of game theory in communications and networking , 2011 .
[8] Simon Parsons,et al. A novel method for automatic strategy acquisition in N-player non-zero-sum games , 2006, AAMAS '06.
[9] Maxim Raya,et al. Security Games in Online Advertising: Can Ads Help Secure the Web? , 2010, WEIS.
[10] Peter McBurney,et al. Evolutionary mechanism design: a review , 2010, Autonomous Agents and Multi-Agent Systems.
[11] Paul W. Goldberg,et al. Learning equilibria of games via payoff queries , 2013, EC '13.
[12] Michael P. Wellman,et al. Methods for empirical game-theoretic analysis (extended abstract) , 2006 .
[13] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[14] Allen B. MacKenzie,et al. Using game theory to analyze wireless ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[15] Ashish Sureka,et al. Using tabu best-response search to find pure strategy nash equilibria in normal form games , 2005, AAMAS '05.
[16] Richard Al-Bayaty,et al. On optimal decisions in an introduction-based reputation protocol , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[17] Michael P. Wellman,et al. Approximate Strategic Reasoning through Hierarchical Reduction of Large Symmetric Games , 2005, AAAI.
[18] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[19] Rajarshi Das,et al. Choosing Samples to Compute Heuristic-Strategy Nash Equilibrium , 2003, AMEC.
[20] Michael P. Wellman,et al. Searching for approximate equilibria in empirical games , 2008, AAMAS.
[21] Michael P. Wellman,et al. EGTAOnline: An Experiment Manager for Simulation-Based Game Studies , 2012, MABS.
[22] Michael P. Wellman,et al. Strategy exploration in empirical games , 2010, AAMAS.
[23] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[24] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[25] Michael P. Wellman,et al. Stronger CDA strategies through empirical game-theoretic analysis and reinforcement learning , 2009, AAMAS.