—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
We consider jamming in wireless networks with transmission cost for both transmitter and jammer. We use the framework of non-zerosum games. In particular, we prove the existence an...
Eitan Altman, Konstantin Avrachenkov, Andrey Garna...
In modern society, people increasingly lack social interaction, even though it is beneficial to professional and personal life. Airhockey Over a Distance aims to work against this...
Florian Mueller, Luke Cole, Shannon O'Brien, Woute...
— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...