Game theory for multi-access edge computing: Survey, use cases, and future trends

J Moura, D Hutchison - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Game theory (GT) has been used with significant success to formulate, and either design or
optimize, the operation of many representative communications and networking scenarios …

A survey on networking games in telecommunications

E Altman, T Boulogne, R El-Azouzi, T Jiménez… - Computers & Operations …, 2006 - Elsevier
In this survey, we summarize different modeling and solution concepts of networking games,
as well as a number of different applications in telecommunications that make use of or can …

[PDF][PDF] Using game theory to analyze wireless ad hoc networks.

V Srivastava, JO Neel, AB MacKenzie… - IEEE Commun. Surv …, 2005 - researchgate.net
The application of mathematical analysis to the study of wireless ad hoc networks has met
with limited success due to the complexity of mobility and traffic models, the dynamic …

On selfish behavior in CSMA/CA networks

M Cagalj, S Ganeriwal, I Aad… - Proceedings IEEE 24th …, 2005 - ieeexplore.ieee.org
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other
protocols, CSMA/CA was designed with the assumption that the nodes would play by the …

[图书][B] Network games: Theory, models, and dynamics

I Menache, AE Ozdaglar - 2011 - books.google.com
Traditional network optimization focuses on a single control objective in a network populated
by obedient users and limited dispersion of information. However, most of today's networks …

Slotted Aloha as a game with partial information

E Altman, R El Azouzi, T Jiménez - Computer networks, 2004 - Elsevier
This paper studies distributed choice of retransmission probabilities in slotted ALOHA. Both
the cooperative team problem as well as the noncooperative game problem are considered …

A hybrid genetic algorithm based on information entropy and game theory

L Jiacheng, L Lei - Ieee Access, 2020 - ieeexplore.ieee.org
To overcome the disadvantages of traditional genetic algorithms, which easily fall to local
optima, this paper proposes a hybrid genetic algorithm based on information entropy and …

Random access game and medium access control design

L Chen, SH Low, JC Doyle - IEEE/ACM transactions on …, 2010 - ieeexplore.ieee.org
Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model,
called random access game, for contention control. We characterize Nash equilibria of …

MAC games for distributed wireless network security with incomplete information of selfish and malicious user types

YE Sagduyu, R Berry… - … Conference on Game …, 2009 - ieeexplore.ieee.org
We consider game theoretic models of wireless medium access control (MAC) in which each
transmitter makes individual decisions regarding their power level or transmission …

An analysis of generalized slotted-aloha protocols

RTB Ma, V Misra, D Rubenstein - IEEE/ACM Transactions on …, 2008 - ieeexplore.ieee.org
Aloha and its slotted variation are commonly deployed medium access control (MAC)
protocols in environments where multiple transmitting devices compete for a medium, yet …