Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
暂无分享,去创建一个
[1] X. Rong Li,et al. Sequential detection of targets in multichannel systems , 2003, IEEE Trans. Inf. Theory.
[2] E. Chang,et al. State of the art review of the existing bayesian-network based approaches to trust and reputation computation , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[3] Vikram Srinivasan,et al. An analytical approach to the study of cooperation in wireless ad hoc networks , 2005, IEEE Transactions on Wireless Communications.
[4] M. Melamed. Detection , 2021, SETI: Astronomy as a Contact Sport.
[5] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[6] Marco Levorato,et al. Analysis of Outage Probability for Cooperative Networks with HARQ , 2007, 2007 IEEE International Symposium on Information Theory.
[7] Zhu Han,et al. Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[8] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[9] R. Srikant,et al. Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.
[10] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[11] S. Tomasin,et al. Detection of Selfish Partners by Control Packets in ARQ-Based CSMA Cooperative Networks , 2008, 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and Applications.
[12] Shivendra S. Panwar,et al. A Cooperative MAC Protocol for Ad Hoc Wireless Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[13] Deniz Gündüz,et al. Opportunistic cooperation by dynamic resource allocation , 2007, IEEE Transactions on Wireless Communications.
[14] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[15] Djamel Djenouri,et al. Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .
[16] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[17] Sathya Narayanan,et al. CoopMAC: A Cooperative MAC for Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.
[18] I. Good. Maximum Entropy for Hypothesis Formulation, Especially for Multidimensional Contingency Tables , 1963 .
[19] Raviraj S. Adve,et al. Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing , 2006, 2006 IEEE International Conference on Communications.
[20] John S. Baras,et al. Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC , 2008, IEEE Communications Magazine.
[21] R. Srikant,et al. DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.
[22] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[23] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[24] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[25] Elza Erkip,et al. User cooperation diversity. Part II. Implementation aspects and performance analysis , 2003, IEEE Trans. Commun..
[26] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[27] Narayan B. Mandayam,et al. Pricing for enabling forwarding in self-configuring ad hoc networks , 2004, WCNC.
[28] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[29] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.