Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
Publications associées (80)
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The set of correlated equilibria is convex and contains all Nash equilibria as special cases. Thus, the social welfare-maximizing correlated equilibrium is amenable to convex analysis and offers social welfare that is at least as good as the games best pe ...
This paper presents a game-theoretic model for the international negotiations that should take place to renew or extend the Kyoto protocol beyond 2012. These negotiations should lead to a self-enforcing agreement on a burden sharing scheme to realize the n ...
We evaluate financial assets with payoffs linked to individual labor income, as conceived by Shiller (2003) and others. Using a realistically calibrated life-cycle model, we find that such assets can generate nontrivial welfare benefits, depending on the p ...
This paper presents a game-theoretic model for the international negotiations that should take place to renew or extend the Kyoto protocol beyond 2012. These negotiations should lead to a self-enforcing agreement on a burden sharing scheme to realize the n ...
Using graph theory, this paper investigates how a group of vehicles, endowed with local positioning capabilities (range and bearing to other vehicles), can keep a predefined formation. We propose a longitudinal and lateral controller that stabilizes a syst ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2010
In this thesis, we address two seemingly unrelated problems, namely routing in large wireless ad hoc networks and comparison based search in image databases. However, the underlying problem is in essence similar and we can use the same strategy to attack t ...
Coordination of autonomous non-point agents is studied in this work. Interactions between vehicles together with their internal dynamics have been modeled as a continuous, unconstrained differential game. In particular, collision prediction is shown to be ...
Multi-user communication theory typically studies the fundamental limits of communication systems, and considers communication schemes that approach or even achieve these limits. The functioning of many such schemes assumes that users always cooperate, eve ...
Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus "sniff on", each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mo ...
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect locat ...