2006
DOI: 10.1016/j.cor.2004.06.005
|View full text |Cite
|
Sign up to set email alerts
|

A survey on networking games in telecommunications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
355
0
2

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 465 publications
(357 citation statements)
references
References 106 publications
0
355
0
2
Order By: Relevance
“…, N the objective function θ ν (x) is continuous on X. A2 The feasible sets X ν (·) are inner-semicontinuous relative to dom(X ν ). 1 The inner-semicontinuity requirement says that ifx belongs to X and, for any player ν, we consider any sequence…”
Section: A1mentioning
confidence: 99%
See 1 more Smart Citation
“…, N the objective function θ ν (x) is continuous on X. A2 The feasible sets X ν (·) are inner-semicontinuous relative to dom(X ν ). 1 The inner-semicontinuity requirement says that ifx belongs to X and, for any player ν, we consider any sequence…”
Section: A1mentioning
confidence: 99%
“…Since in a Nash game every player is trying to minimize his own objective function, a natural approach is to consider an iterative algorithm based on a Gauss-Seidel scheme where at each iteration every player, given the strategies of the others, updates his own strategy by solving his optimization problem (1). The resulting algorithm is described below.…”
Section: Introductionmentioning
confidence: 99%
“…Game Theory (GT) offers methods to bring competition into the business models. An overview of the use of GT in the telecommunication research area can be found in Altman, Boulogne, El-Azouzi, Jiménez, and Wynter (2006). However, the different topics described focus on noneconomic games.…”
Section: Introductionmentioning
confidence: 99%
“…It gives a framework and systematic approach for predicting the consequences of complex and dynamic connections between normal agents who endeavor to maximize personal payoff (or reduce private cost) according to strategies of other agents [10]. Because of its interesting and sometimes unpredicted outcomes, its popularity reached the field of communications and networking technology [11]. Recently it has been used for secure routing [12], selfish node detection [13], intrusion detection [14] and monitoring node behaviors [15] in MANET.…”
Section: Introductionmentioning
confidence: 99%