References

  1. Parosh Abdulla, Giorgio Delzanno, Othmane Rezine, Arnaud Sangnier & Riccardo Traverso (2011): On the Verification of Timed Ad Hoc Networks. In: Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11), Lecture Notes in Computer Science. Springer, doi:10.1007/978-3-642-24310-3_18.
  2. Norman Abramson (1970): The Aloha system: another alternative for computer communications. In: Proceedings of the November 17-19, 1970, fall joint computer conference, AFIPS '70 (Fall). ACM, New York, NY, USA, pp. 281–285, doi:10.1145/1478462.1478502.
  3. ZigBee Alliance (2005): ZigBee specification 1.0.
  4. Eitan Altman, Nicolas Bonneau, Merouane Debbah & Giuseppe Caire (2005): An evolutionary game perspective to Aloha with power control. In: ITC 19, 19th International Teletraffic Congress, August 29 - September 2, 2005.
  5. Rajeev Alur, Salvatore La Torre & George J. Pappas (2001): Optimal Paths in Weighted Timed Automata. In: HSCC'01. Springer, pp. 49–62, doi:10.1016/j.tcs.2003.10.038.
  6. Gerd Behrmann, Ansgar Fehnker, Thomas Hune, Kim Guldstrand Larsen, Paul Pettersson, Judi Romijn & Frits W. Vaandrager (2001): Minimum-Cost Reachability for Priced Timed Automata. In: HSCC, pp. 147–161.
  7. Patricia Bouyer, Kim Guldstrand Larsen & Nicolas Markey (2008): Model Checking One-Clock Priced Timed Automata. Logical Methods in Computer Science 4(2), doi:10.2168/LMCS-4(2:9)2008.
  8. Levente Buttyan & Jean-Pierre Hubaux (2008): Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge.
  9. Mario Cagalj, Saurabh Ganeriwal, Imad Aad & Jean-Pierre Hubaux (2004): On Cheating in CSMA/CA Ad Hoc Networks. Technical Report. Proc. IEEE INFOCOM 2005.
  10. Franck Cassez & Kim Guldstrand Larsen (2000): The Impressive Power of Stopwatches. In: CONCUR, pp. 138–152, doi:10.1007/3-540-44618-4_12.
  11. Johannes Dams, Thomas Kesselheim & Berthold Vocking (2011): Transmission Probability Control Game with Limited Energy. In: IEEE DySPAN, to appear, doi:10.1109/DYSPAN.2011.5936232.
  12. Alexandre David, Kim G. Larsen, Axel Legay, Marius Mikucionis, Danny Poulsen, Jonas van Vliet & Zheng Wang (2011): Statistical Model Checking for Networks of Priced Timed Automata. In: Proceedings of Formal Modeling and Analysis of Timed Systems. LNCS, Aalborg, pp. 80–96, doi:10.1007/978-3-642-24310-3.
  13. Alexandre David, Kim G. Larsen, Axel Legay, Marius Mikucionis & Zheng Wang (2011): Time for Statistical Model Checking of Real-time Systems. In: Proceedings of the 23rd International Conference on Computer Aided Verification (CAV), LNCS. Springer Verlag, pp. 349–355, doi:10.1007/978-3-642-22110-1_27.
  14. Mark Felegyhazi, Student Member, Jean pierre Hubaux, Senior Member & Levente Buttyan (2006): Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. IEEE Transactions on Mobile Computing 5, doi:10.1109/TMC.2006.68.
  15. Abdorasoul Ghasemi & Karim Faez (2008): A nash power-aware MAC game for ad hoc wireless networks. In: PIMRC. IEEE, pp. 1–5, doi:10.1109/PIMRC.2008.4699511.
  16. Ehud Kalai (1991): Game theory: Analysis of conflict : By Roger B. Myerson, Harvard Univ. 568 pp.. Games and Economic Behavior 3(3).
  17. Kim G. Larsen, Paul Pettersson & Wang Yi (1997): Uppaal in a Nutshell. Int. Journal on Software Tools for Technology Transfer 1(1–2), pp. 134–152, doi:10.1007/s100090050010.
  18. Axel Legay & Beno^ıt Delahaye (2010): Statistical Model Checking : An Overview. CoRR abs/1005.1327, doi:10.1007/978-3-642-16612-9_11.
  19. A. B. Mackenzie & S. B. Wicker (2001): Game theory and the design of self-configuring, adaptive wireless networks. Communications Magazine, IEEE 39(11), pp. 126–131, doi:10.1109/35.965370.
  20. J. Neel, R. Menon, A. MacKenzie & J. Reed (2005): Using game theory to aid the design of physical layer cognitive radio algorithms. In: Conf. on Economics, Technology and Policy of Unlicensed Spectrum.
  21. P Nuggehalli, M Sarkar, K Kulkarni & R Rao (2008): A Game-Theoretic Analysis of QoS in Wireless MAC. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 1903–1911, doi:10.1109/INFOCOM.2008.254.
  22. IEEE Computer Society (2003): Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs).
  23. V. Srivastava, J. Neel, A.B. Mackenzie, R. Menon, L.A. Dasilva, J.E. Hicks, J.H. Reed & R.P. Gilles (2005): Using game theory to analyze wireless ad hoc networks. Communications Surveys Tutorials, IEEE 7(4), pp. 46 – 56, doi:10.1109/COMST.2005.1593279.
  24. Hakan L. S. Younes (2005): Verification and Planning for Stochastic Processes with Asynchronous Events. Carnegie Mellon University.
  25. Irfan Zakiuddin, Tim Hawkins & Nick Moffat (2005): Towards A Game Theoretic Understanding of Ad-Hoc Routing. Electronic Notes in Theoretical Computer Science 119(1), pp. 67 – 92, doi:10.1016/j.entcs.2004.07.009.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org