Sciweavers

245 search results - page 30 / 49
» A low power scheduler using game theory
Sort
View
107
Voted
MOBIHOC
2007
ACM
16 years 4 days ago
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...
Dong Zheng, Weiyan Ge, Junshan Zhang
PODC
2004
ACM
15 years 6 months ago
Completely fair SFE and coalition-safe cheap talk
Secure function evaluation (SFE) enables a group of players, by themselves, to evaluate a function on private inputs as securely as if a trusted third party had done it for them. ...
Matt Lepinski, Silvio Micali, Chris Peikert, Abhi ...
99
Voted
WIMOB
2008
IEEE
15 years 7 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
73
Voted
VTC
2006
IEEE
15 years 6 months ago
Using Unclaimed Sub-Carriers in Opportunistic OFDMA Systems
Abstract— In this paper, we consider the unclaimed subcarriers that no user feeds back in an opportunistic OFDMA system with a per sub-carrier power constraint. Unclaimed subcarr...
Patrick Svedman, Leonard J. Cimini Jr., Björn...
CCR
2004
147views more  CCR 2004»
15 years 12 days ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...