This paper considers the problem of optimal and competitive wireless access for data streaming over vehicleto-roadside (V2R) communication. In a service area, the onboard units (OB...
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Abstract--Amazon, Google, and IBM now sell cloud computing services. We consider the setting of a for-profit business selling data stream monitoring/management services and we inve...
In this paper we introduce a pricing scheme to be employed between a group of Internet service providers (ISPs) and a customer who wishes to initiate a packet flow from a fixed o...
The energy-delay tradeoffs in wireless networks are studied using a game-theoretic framework. A multi-class multipleaccess network is considered in which users choose their transmi...
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwar...