Vidal's library
Title: Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks
Author: Allen B. MacKenzie and Stephen B. Wicker
Journal: IEEE Communications Magazine
Volume: 39
Number: 11
Pages: 126--131
Year: 2001
DOI: 10.1109/35.965370
Abstract: Game theory provides a wealth of tools that can be applied to the design and operation of communications systems. In this article, we provide a brief introduction to game theory. We then present applications of game theory to problems in random access and power control. In the case of random access, we examine the behavior of selfish users in a simplified Aloha system; surprisingly, rational selfish users do not implement the “always transmit” strategy that one might expect. In the case of power control, we show that game theoretic techniques can yield an optimal operating point without the intervention of an external controller

Cited by 53  -  Google Scholar

@Article{mackenzie01a,
  author =	 {Allen B. MacKenzie and Stephen B. Wicker},
  title =	 {Game Theory and the Design of Self-Configuring,
                  Adaptive Wireless Networks},
  journal =	 {{IEEE} Communications Magazine},
  year =	 2001,
  volume =	 39,
  number =	 11,
  pages =	 {126--131},
  abstract =	 {Game theory provides a wealth of tools that can be
                  applied to the design and operation of
                  communications systems. In this article, we provide
                  a brief introduction to game theory. We then present
                  applications of game theory to problems in random
                  access and power control. In the case of random
                  access, we examine the behavior of selfish users in
                  a simplified Aloha system; surprisingly, rational
                  selfish users do not implement the ``always transmit''
                  strategy that one might expect. In the case of power
                  control, we show that game theoretic techniques can
                  yield an optimal operating point without the
                  intervention of an external controller},
  url = 	 {http://jmvidal.cse.sc.edu/library/mackenzie01a.pdf},
  doi = 	 {10.1109/35.965370},
  cluster = 	 {13441210610377678207}
}
Last modified: Wed Mar 9 10:15:16 EST 2011