- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The fundamentals of designing, implementing, and deploying cognitive radio networks, with a unique focus on game theory and its applications.
Andere Kunden interessierten sich auch für
- Robert Caiming QiuCognitive Radio Communication and Networking114,99 €
- R. KalidossCognitive Radio - An Enabler for Internet of Things101,99 €
- Tao JiangCognitive Radio Networks131,99 €
- Cognitive Radio145,99 €
- Tanuja S DhopeCognitive Radio Networks Optimization with Spectrum Sensing Algorithms101,99 €
- Flexible and Cognitive Radio Access Technologies for 5g and Beyond164,99 €
- Green Radio Communication Networks107,99 €
-
-
-
The fundamentals of designing, implementing, and deploying cognitive radio networks, with a unique focus on game theory and its applications.
Produktdetails
- Produktdetails
- Verlag: Cambridge University Press
- Seitenzahl: 618
- Erscheinungstermin: 28. Oktober 2010
- Englisch
- Abmessung: 251mm x 170mm x 33mm
- Gewicht: 1361g
- ISBN-13: 9780521762311
- ISBN-10: 0521762316
- Artikelnr.: 30517778
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Cambridge University Press
- Seitenzahl: 618
- Erscheinungstermin: 28. Oktober 2010
- Englisch
- Abmessung: 251mm x 170mm x 33mm
- Gewicht: 1361g
- ISBN-13: 9780521762311
- ISBN-10: 0521762316
- Artikelnr.: 30517778
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
K. J. Ray Liu is a Distinguished Scholar-Teacher at the University of Maryland, College Park. He is the recipient of numerous honors and awards including the 2009 IEEE Signal Processing Society Technical Achievement Award, IEEE Signal Processing Society Distinguished Lecturer, National Science Foundation Presidential Young Investigator, and various best paper awards.
Part I. Cognitive Radio Communications and Cooperation: 1. Introduction to cognitive radios
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.
Part I. Cognitive Radio Communications and Cooperation: 1. Introduction to cognitive radios
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.