1 |
A. B. MacKenzie and S. B. Wicker, "Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information," in Proc. of IEEE Conference on Computer Communications (INFOCOM), pp.1583-1590, Apr. 1-3, 2003.
|
2 |
J. Lee, A. Tang, J. Huang, M. Chiang and A. R. Calderbank, "Reverse-engineering mac: A non-cooperative game model," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1135-1147, Aug. 2007.
DOI
|
3 |
H. Inaltekin and S. Wicker, "The analysis of Nash equilibria of the one- shot random-access game for wireless networks and the behavior of selfish nodes," IEEE/ACM Transactions on Networking, vol. 16, no. 5, pp. 1094-1107, Oct. 2008.
DOI
|
4 |
L. Zhao, J. Zhang, K. Yang and H. Zhang, "Using incompletely cooperative game theory in mobile ad hoc networks," in Proc. IEEE International Conference on Communications (ICC '07), pp. 3401-3406, June 2007.
|
5 |
L. Zhao, J. Zhang and H. Zhang, "Using incompletely cooperative game theory in wireless mesh networks," IEEE/ACM Transactions on Networking, vol. 22, no. 1, pp. 39-44, Jan. - Feb. 2008.
|
6 |
A. B. MacKenzie and L. A. DaSilva, "Game Theory for Wireless Engineers," San Rafael, California: Morgan & Claypool Publishers, 2006.
|
7 |
K. Park, J. C. Hou, T. Basar and H. Kim, "Noncooperative Carrier Sense Game in Wireless Networks," IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5280--5289, 2009.
DOI
|
8 |
D. Fudenberg and J. Tirole, Game Theory, the MIT Press, 1991.
|
9 |
C. Chin, "Slotted Aloha with time-variant transmission probabilities," to be submitted, 2011.
|
10 |
J. F. Nash, "Equilibrium points in n-person games," in Proc. of the National Academy of Sciences of the United States of America, vol. 36, no. 1, pp.48-49, Jan. 1950.
|
11 |
M. H. Ngo and V. Krishnamurthy, "Game theoretic cross-layer trans-mission policies in multipacket reception wireless networks," IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 1911-1926, May 2007.
DOI
|
12 |
Y. Jin and G. Kesidis, "Distributed contention window control for selfish users in IEEE 802.11 wireless LANs," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1113-1123, Aug. 2007.
|
13 |
T. Cui, L. Chen and S. Low, "A game-theoretic framework for medium access control," IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 1116-1127, Sep. 2008.
DOI
|
14 |
L. Zhao, J. Zhang and H. Zhang, "GDCF: game-theoretic distributed co-ordination function in WLANs," Electronics Letters, vol. 43, no. 9, pp. 510-511, Apr. 2007.
DOI
ScienceOn
|
15 |
H. Lee, H. Kwon, A. Motskin and L. Guibas, "Interference-aware MAC protocol for wireless networks by a game-theoretic approach," in Proc. 28th IEEE Conference on Computer Communications (INFOCOM '09), pp. 1854-1862, Apr. 2009.
|
16 |
J. Lee, A. Tang, J. Huang, M. Chiang and A. R. Calderbank, "Reverse-engineering mac: A non-cooperative game model," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1135-1147, Aug. 2007.
|
17 |
Y. Jin and G. Kesidis, "Equilibria of a Noncooperative Game for Heterogeneous Users of an ALOHA Network," IEEE Communications Letters, vol. 6, no. 7, pp.282-284, July 2002.
DOI
|
18 |
H. Inaltekin and S. Wicker, "The analysis of Nash equilibria of the one- shot random-access game for wireless networks and the behavior of selfish nodes," IEEE/ACM Transactions on Networking, vol. 16, no. 5, pp. 1094-1107, Oct. 2008.
|
19 |
L. Chen, S. Low and J. Doyle, "Random Access Game and Medium Access Control Design," IEEE/ACM Transactions on Networking, vol. 17, no. 3, pp. 1303-1316, 2010.
|
20 |
R. T. B. Ma, V. Misra and D. Rubenstein, "An Analysis of Generalized Slotted-Aloha Protocols," IEEE/ACM Transactions on Networking, pp. 936-949, June 2009.
|
21 |
J. Konorski, "A game-theoretic study of CSMA/CA under a backoff attack," IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1167-1178, Dec. 2006.
DOI
|
22 |
E. Altman, R. E. Azouzi and T. Jimnez, "Slotted Aloha as a game with partial information," The International Journal of Computer and Telecommunications Networking, vol. 45, no 6, pp. 701-713, 2004.
|
23 |
Y. Cho, C. S. Hwang and F. A. Tobagi, "Design of Robust Random Access Protocols For Wireless Networks using Game Theoretic Models," in Proc. of IEEE INFOCOM, pp. 1750-1758, Apr. 13-18, 2008.
|
24 |
Y. Jin and G. Kesidis, "Distributed contention window control for selfish users in IEEE 802.11 wireless LANs," IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1113-1123, Aug. 2007.
DOI
|
25 |
N. Abramson, "The Aloha system: another alternative for computer communications," in Proc. of AFIPS, vol. 36, pp. 295-298, Nov. 17-19, 1970.
|
26 |
A. B. MacKenzie and S. B. Wicker, "Selfish users in aloha: A game theoretic approach," in Proc. of the Fall 2001 IEEE Vehicular Technology Conference (VTC Fall '01), pp. 1354-1357, Oct. 2001.
|