2013
DOI: 10.1109/tmc.2012.133
|View full text |Cite
|
Sign up to set email alerts
|

Game-Based Broadcast over Reliable and Unreliable Wireless Links in Wireless Multihop Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(49 citation statements)
references
References 31 publications
0
49
0
Order By: Relevance
“…Other problems that have been formulated in terms of potential games are found in routing [9], [97], [156], [157], [186], [203], BS/AP selection [98], [99], [112], [161], [172], cooperative transmissions [4], [139], secrecy rate maximization [11], code design for radar [146], broadcasting [35], spectrum market [87], network coding [115], [147], [148], data cashing [94], social networks [40], computation offloading [42], localization [79], and demand-side management in smart grids [77], [183]. …”
Section: Discussionmentioning
confidence: 99%
“…Other problems that have been formulated in terms of potential games are found in routing [9], [97], [156], [157], [186], [203], BS/AP selection [98], [99], [112], [161], [172], cooperative transmissions [4], [139], secrecy rate maximization [11], code design for radar [146], broadcasting [35], spectrum market [87], network coding [115], [147], [148], data cashing [94], social networks [40], computation offloading [42], localization [79], and demand-side management in smart grids [77], [183]. …”
Section: Discussionmentioning
confidence: 99%
“…The GBBTC algorithm studied in [11] has three main drawbacks. Firstly, it does not perform power control at the transmitting nodes.…”
Section: A Related Workmentioning
confidence: 99%
“…Since the outcome of the MILP must be a tree graph rooted at the source, i.e., S ∈ R i .∀i ∈ W, three conditions for the downstream have to be met [11]. Firstly, the source node cannot be in the downstream of any other node as it is not a CN for other PNs.…”
Section: Centralized Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…It can be used as a rich mathematical tool to evaluate and model a new security problem. Moreover, through the stability analysis of the security game, the protector can gain a deeper understanding of the attacker's strategy, as well as the potential attack risks [4,5]. In this survey, we presented an impression of security and privacy problems that are analyzed within a gametheoretic framework.…”
Section: Introductionmentioning
confidence: 99%