Sciweavers

245 search results - page 30 / 49
» A low power scheduler using game theory
Sort
View
85
Voted
MOBIHOC
2007
ACM
15 years 9 months ago
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...
Dong Zheng, Weiyan Ge, Junshan Zhang
PODC
2004
ACM
15 years 2 months ago
Completely fair SFE and coalition-safe cheap talk
Secure function evaluation (SFE) enables a group of players, by themselves, to evaluate a function on private inputs as securely as if a trusted third party had done it for them. ...
Matt Lepinski, Silvio Micali, Chris Peikert, Abhi ...
WIMOB
2008
IEEE
15 years 3 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
VTC
2006
IEEE
15 years 3 months ago
Using Unclaimed Sub-Carriers in Opportunistic OFDMA Systems
Abstract— In this paper, we consider the unclaimed subcarriers that no user feeds back in an opportunistic OFDMA system with a per sub-carrier power constraint. Unclaimed subcarr...
Patrick Svedman, Leonard J. Cimini Jr., Björn...
CCR
2004
147views more  CCR 2004»
14 years 9 months ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...