Sciweavers

JSAC
2008
114views more  JSAC 2008»
13 years 11 months ago
Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad Hoc Networks with Rational Nodes
Nodes in an ad hoc wireless network incur certain costs for forwarding packets since packet forwarding consumes the resources of the nodes. If the nodes are rational, free packet f...
N. Ram Suri, Y. Narahari
JSAC
2008
95views more  JSAC 2008»
13 years 11 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
JSAC
2008
164views more  JSAC 2008»
13 years 11 months ago
Coordinated beamforming with limited feedback in the MIMO broadcast channel
In this paper, we propose a new joint optimization of linear transmit beamforming and receive combining vectors for the multiple-input multiple-output (MIMO) broadcast channel. We ...
Chan-Byoung Chae, David Mazzarese, Nihar Jindal, R...
JSAC
2008
146views more  JSAC 2008»
13 years 11 months ago
On the Interaction and Competition among Internet Service Providers
The current Internet architecture comprises of different privately owned Internet service providers (ISPs) where higher tier ISPs supply connectivity service to lower tier ISPs an...
Sam C. M. Lee, John C. S. Lui
JSAC
2008
115views more  JSAC 2008»
13 years 11 months ago
A Discrete-Time Channel Simulator Driven by Measured Scattering Functions
In-situ measurements of the scattering function are used to drive a channel simulator developed in the context of underwater acoustic telemetry. Two operation modes of the simulato...
Paul A. van Walree, Trond Jenserud, Morten Smedsru...
43
Voted
JSAC
2008
61views more  JSAC 2008»
13 years 11 months ago
Guest Editorial Multiuser Detection for Advanced Communication Systems and Networks
Ananthanarayanan Chockalingam, Urbashi Mitra, Erik...
JSAC
2008
121views more  JSAC 2008»
13 years 11 months ago
Network Coding Games with Unicast Flows
Abstract--To implement network coding, users need to coordinate and cooperate with respect to their strategies in terms of duplicating and transmitting side information across spec...
Jennifer Price, Tara Javidi
JSAC
2008
70views more  JSAC 2008»
13 years 11 months ago
Managing a Peer-to-Peer Data Storage System in a Selfish Society
We compare two possible mechanisms to manage a peer-to-peer storage system, where participants can store data online on the disks of peers in order to increase data availability an...
Patrick Maillé, László Toka
JSAC
2008
140views more  JSAC 2008»
13 years 11 months ago
Optimality and Complexity of Pure Nash Equilibria in the Coverage Game
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method. We assume that nodes are randomly scattered in a sensor field and the goa...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
JSAC
2008
94views more  JSAC 2008»
13 years 11 months ago
Detection, Synchronization, and Doppler Scale Estimation with Multicarrier Waveforms in Underwater Acoustic Communication
In this paper, we propose a novel method for detection, synchronization and Doppler scale estimation for underwater acoustic communication using orthogonal frequency division multi...
Sean F. Mason, Christian R. Berger, Shengli Zhou, ...