Game theoretic approach to medium access control in wireless networks
暂无分享,去创建一个
Costas C. Constantinou | S. H. E. Mortazavi Najafabadi | C. Constantinou | S. J. Najafabadi | S. H. E. M. Najafabadi
[1] L. Kleinrock,et al. Packet Switching in Radio Channels : Part Il-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution , 2022 .
[2] Chong-Ho Choi,et al. Analysis of the IEEE 802.11 Back-Off Mechanism in Presence of Hidden Nodes , 2009, IEICE Trans. Commun..
[3] Yongkang Xiao,et al. Game theory models for IEEE 802.11 DCF in wireless ad hoc networks , 2005, IEEE Communications Magazine.
[4] Anthony Ephremides,et al. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.
[5] Thierry Turletti,et al. Modeling and analysis of slow CW decrease IEEE 802.11 WLAN , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[6] W. Marsden. I and J , 2012 .
[7] Sanjay Gupta,et al. Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol , 1997, Wirel. Networks.
[8] Jerzy Konorski. A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.
[9] Ashok K. Agrawala,et al. Sniffing out the correct physical layer capture model in 802.11b , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[10] Fouad A. Tobagi,et al. Cooperative and Non-Cooperative Aloha Games with Channel Capture , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[11] Jennifer C. Hou,et al. A Novel Approach to Contention Control in IEEE 802.11e-Operated WLANs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] Fu-Yi Hung,et al. Performance Modeling and Analysis of the IEEE 802.11 Distribution Coordination Function in Presence of Hidden Stations , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[13] Anthony Ephremides,et al. Power control and rate adaptation as stochastic games for random access , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[14] Dina Katabi,et al. Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.
[15] Srihari Nelakuditi,et al. CSMA/CN: Carrier Sense Multiple Access With Collision Notification , 2012, IEEE/ACM Transactions on Networking.
[16] John S. Thompson,et al. A New Approach for the Throughput Analysis of IEEE 802.11 in Networks with Hidden Terminals , 2005 .
[17] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[18] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[19] P. Karn,et al. MACA-a New Channel Access Method for Packet Radio , 1990 .
[20] Pavan Nuggehalli,et al. A Game-Theoretic Analysis of QoS in Wireless MAC , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[21] Cristina Comaniciu,et al. A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha , 2008, IEEE Transactions on Wireless Communications.
[22] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[23] Hailin Zhang,et al. Using Incompletely Cooperative Game Theory in Wireless Mesh Networks , 2008, IEEE Network.
[24] Jean-Pierre Hubaux,et al. Efficient MAC in cognitive radio systems: A game-theoretic approach , 2009, IEEE Transactions on Wireless Communications.
[25] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[26] Leonidas J. Guibas,et al. Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach , 2009, IEEE INFOCOM 2009.
[27] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[28] David I. Laurenson,et al. Revisiting the Hidden Terminal Problem in a CSMA/CA Wireless Network , 2008, IEEE Transactions on Mobile Computing.
[29] R. Aumann. Subjectivity and Correlation in Randomized Strategies , 1974 .
[30] Dinan Gunawardena,et al. Rethinking Indoor Wireless Mesh Design: Low Power, Low Frequency, Full-Duplex , 2010, 2010 Fifth IEEE Workshop on Wireless Mesh Networks.
[31] Yu Wang,et al. Performance of collision avoidance protocols in single-channel ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[32] Luigi Fratta,et al. Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.
[33] Debdeep Chatterjee,et al. Resource allocation and cooperative behavior in fading multiple-access channels under uncertainty , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[34] Robert G. Sargent,et al. Verification and validation of simulation models , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).
[35] Lijun Chen,et al. Contention control: A game-theoretic approach , 2007, 2007 46th IEEE Conference on Decision and Control.
[36] Zhu Han,et al. Wireless Access in Vehicular Environments Using BitTorrent and Bargaining , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[37] Kwang-Cheng Chen,et al. Interference analysis of nonpersistent CSMA with hidden terminals in multicell wireless data networks , 1995, Proceedings of 6th International Symposium on Personal, Indoor and Mobile Radio Communications.
[38] Liqiang Zhao,et al. A novel MAC scheme for wireless LANs from the perspective of game theory , 2007 .
[39] Kwang-Cheng Chen,et al. Performance analysis of IEEE 802.11 CSMA/CA medium access control protocol , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.
[40] Dong In Kim,et al. Game Theoretic Approaches for Multiple Access in Wireless Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.
[41] David Wetherall,et al. Taking the sting out of carrier sense: interference cancellation for wireless LANs , 2008, MobiCom '08.
[42] Theodore Antonakopoulos,et al. CSMA/CA performance under high traffic conditions: throughput and delay analysis , 2002, Comput. Commun..
[43] Haitao Wu,et al. WSN02-1: Analysis of IEEE 802.11 DCF with Hidden Terminals , 2006, IEEE Globecom 2006.
[44] Allen B. MacKenzie,et al. Game Theory for Wireless Engineers , 2006, Game Theory for Wireless Engineers.
[45] Marco Conti,et al. Runtime optimization of IEEE 802.11 wireless LANs performance , 2004, IEEE Transactions on Parallel and Distributed Systems.
[46] Jason Liu,et al. Experimental evaluation of wireless simulation assumptions , 2004, MSWiM '04.
[47] Yuguang Fang,et al. A novel MAC protocol with fast collision resolution for wireless LANs , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[48] Jong-Tae Lim,et al. Throughput analysis considering coupling effect in ieee 802.11 networks with hidden stations , 2009, IEEE Commun. Lett..
[49] Andrzej Duda,et al. Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs , 2005, SIGCOMM '05.
[50] Vaduvur Bharghavan,et al. MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.
[51] Fouad A. Tobagi,et al. Design of Robust Random Access Protocols For Wireless Networks Using Game Theoretic Models , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[52] Sachin Katti,et al. Embracing wireless interference: analog network coding , 2007, SIGCOMM '07.
[53] Tracy Camp,et al. MANET simulation studies: the incredibles , 2005, MOCO.
[54] Lijun Chen,et al. Random Access Game and Medium Access Control Design , 2010, IEEE/ACM Transactions on Networking.
[55] Xing Li,et al. Dynamic optimization of IEEE 802.11 CSMA/CA based on the number of competing stations , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[56] Costas C. Constantinou,et al. A game theoretic model for wireless medium access control in the presence of hidden terminals , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[57] Nikos Vlassis,et al. A Concise Introduction to Multiagent Systems and Distributed AI , 2003 .
[58] Stephen B. Wicker,et al. The Analysis of a Game Theoretic MAC Protocol for Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[59] Gordon L. Stuber,et al. Principles of Mobile Communication , 1996 .
[60] John V. Guttag,et al. Time-based Fairness Improves Performance in Multi-Rate WLANs , 2004, USENIX Annual Technical Conference, General Track.
[61] Allen B. MacKenzie,et al. Game Theory for Wireless Engineers (Synthesis Lectures on Communications) , 2006 .
[62] Jie Zhang,et al. Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[63] David Starobinski,et al. Performance of wireless networks with hidden nodes: a queuing-theoretic analysis , 2005, Comput. Commun..
[64] Levente Buttyán,et al. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .
[65] David Malone,et al. Modeling the 802.11 distributed coordination function in non-saturated conditions , 2005, IEEE Communications Letters.
[66] Robert Tappan Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.
[67] K. Sakakibara,et al. Analysis of unsaturation throughput of IEEE 802.11 DCF , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[68] Haitao Wu,et al. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[69] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[70] D. W. Bliss,et al. Simultaneous Transmission and Reception for Improved Wireless Network Performance , 2007, 2007 IEEE/SP 14th Workshop on Statistical Signal Processing.
[71] Ilenia Tinnirello,et al. Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[72] Izhak Rubin,et al. Analysis of Random Access Protocol under Bursty Traffic , 2001, MMNS.
[73] Stephan Robert,et al. Dynamic tuning of the contention window minimum (CW/sub min/) for enhanced service differentiation in IEEE 802.11 wireless ad-hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[74] Raj Jain,et al. A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.
[75] Richard T. B. Ma,et al. An Analysis of Generalized Slotted-Aloha Protocols , 2009, IEEE/ACM Transactions on Networking.
[76] Kee Chaing Chua,et al. A Capacity Analysis for the IEEE 802.11 MAC Protocol , 2001, Wirel. Networks.
[77] R. Abraham,et al. Manifolds, Tensor Analysis, and Applications , 1983 .
[78] Lawrence G. Roberts,et al. Extensions of packet communication technology to a hand held personal terminal , 1972, AFIPS '72 (Spring).
[79] Hari Balakrishnan,et al. Divert: fine-grained path selection for wireless LANs , 2004, MobiSys '04.
[80] Hossam S. Hassanein,et al. A new class of collision prevention MAC protocols for wireless ad hoc networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[81] Vaduvur Bharghavan,et al. Achieving MAC layer fairness in wireless packet networks , 2000, MobiCom '00.
[82] Ajay Chandra V. Gummalla,et al. Wireless medium access control protocols , 2000, IEEE Communications Surveys & Tutorials.
[83] Norman M. Abramson,et al. Development of the ALOHANET , 1985, IEEE Trans. Inf. Theory.
[84] Nah-Oak Song,et al. Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..
[85] Debarshi Kumar Sanyal,et al. Game-Theoretic Modeling and Optimization of Contention-Prone Medium Access Phase in IEEE 802.16/WiMAX Networks , 2008, 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications.
[86] Fu-Yi Hung,et al. Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations , 2010, Comput. Networks.
[87] Robert Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM 2004.
[88] l.L. Gheorma,et al. RF Photonic Techniques for Same Frequency Simultaneous Duplex Antenna Operation , 2007, IEEE Photonics Technology Letters.
[89] Abbas Yongaçoglu,et al. IEEE 802.11a Throughput Performance with Hidden Nodes , 2008, IEEE Communications Letters.
[90] Stephen B. Wicker,et al. Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[91] Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.
[92] Lijun Chen,et al. A Game-Theoretic Framework for Medium Access Control , 2008, IEEE Journal on Selected Areas in Communications.
[93] Marco Conti,et al. Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit , 2000, TNET.