Browsing Computer Science & Engineering by Subject "game theory"
Now showing items 1-6 of 6
-
Accelerated IoT Anti-Jamming: A Game Theoretic Power Allocation Strategy
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)A jamming combating power allocation strategy is proposed to secure the data communication in IoT networks. The proposed strategy aims to minimize the worst case jamming effect on the intended transmission under multi ... -
Auction-based relay power allocation: Pareto optimality, fairness, and convergence
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, ... -
A Blockchain-Based Storage System with Financial Incentives for Load-balancing
( IEEE Computer Society , 2021 , Article)Most storage systems adopt distributed architecture to reach high reliability. In these distributed systems, a well-balanced data distribution can improve storage reliability. However, existing schemes rely on dealers to ... -
Game theoretic data privacy preservation: Equilibrium and pricing
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Privacy issues arising in the process of collecting, publishing and mining individuals' personal data have attracted much attention in recent years. In this paper, we consider a scenario where a data collector collects ... -
Power Allocation for D2D Communications with SWIPT
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Power allocation plays a vital role in coordinating interference between Device-to-Device (D2D) and cellular communications, and when power allocation meets simultaneous wireless information and power transfer (SWIPT), the ... -
Untitled
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Many spectrum sensing techniques have been proposed to allow a secondary user (SU) to utilize a primary user's (PU) spectrum through opportunistic access. However, few of them have considered the tradeoff between accuracy ...