2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) 2004
DOI: 10.1109/icc.2004.1312852
|View full text |Cite
|
Sign up to set email alerts
|

Optimal strategies in MAC protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2005
2005
2008
2008

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…First, the contention-based nature of medium access presents a natural application domain for Non-Cooperative Game Theory. Second, it is possible to conceive of "selfish" users in the future choosing their individual access strategies to optimize their own selfish interests [13], [37], [30]. The "virtual time"-based or "static priority"-based approaches described above are not suited for such situations.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…First, the contention-based nature of medium access presents a natural application domain for Non-Cooperative Game Theory. Second, it is possible to conceive of "selfish" users in the future choosing their individual access strategies to optimize their own selfish interests [13], [37], [30]. The "virtual time"-based or "static priority"-based approaches described above are not suited for such situations.…”
Section: Motivation and Contributionmentioning
confidence: 99%