- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The fundamentals of designing, implementing, and deploying cognitive radio networks, with a unique focus on game theory and its applications.
Andere Kunden interessierten sich auch für
- Green Radio Communication Networks126,99 €
- Radio Propagation Measurements and Channel Modeling: Best Practices for Millimeter-Wave and Sub-Terahertz Frequencies152,99 €
- Kamal M CaptainSpectrum Sensing for Cognitive Radio152,99 €
- Cognitive Radio Technology125,99 €
- Robert Caiming QiuCognitive Radio Communication and Networking132,99 €
- R. KalidossCognitive Radio - An Enabler for Internet of Things119,99 €
- Fei HuMultimedia Over Cognitive Radio Networks186,99 €
-
-
-
The fundamentals of designing, implementing, and deploying cognitive radio networks, with a unique focus on game theory and its applications.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Cambridge University Press
- Seitenzahl: 618
- Erscheinungstermin: 29. November 2010
- Englisch
- Abmessung: 251mm x 170mm x 33mm
- Gewicht: 1361g
- ISBN-13: 9780521762311
- ISBN-10: 0521762316
- Artikelnr.: 30517778
- Verlag: Cambridge University Press
- Seitenzahl: 618
- Erscheinungstermin: 29. November 2010
- Englisch
- Abmessung: 251mm x 170mm x 33mm
- Gewicht: 1361g
- ISBN-13: 9780521762311
- ISBN-10: 0521762316
- Artikelnr.: 30517778
K. J. Ray Liu is a Distinguished Scholar-Teacher at the University of Maryland, College Park. He is the recipient of numerous honors and awards including the 2009 IEEE Signal Processing Society Technical Achievement Award, IEEE Signal Processing Society Distinguished Lecturer, National Science Foundation Presidential Young Investigator, and various best paper awards.
Part I. Cognitive Radio Communications and Cooperation: 1. Introduction to cognitive radios
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.
Part I. Cognitive Radio Communications and Cooperation: 1. Introduction to cognitive radios
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.
2. Game theory for cognitive radio networks
3. Markov models for dynamic spectrum allocation
4. Repeated open spectrum sharing game
5. Pricing game for dynamic spectrum allocation
6. A multi-winner cognitive spectrum auction game
7. Evolutionary cooperative spectrum sensing game
8. Anti-jamming stochastic game
9. Opportunistic multiple access for cognitive networks
Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications
11. Repeated game and learning for packet forwarding
12. Dynamic pricing games for routing
13. Connectivity-aware network lifetime optimization
14. Connectivity-aware network maintenance and repair
Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation
16. Defense against routing disruptions
17. Defense against injecting traffic attacks
18. Attack-resistant cooperation stimulation
19. Optimal strategies for cooperation stimulation
20. Belief evaluation for cooperation enforcement
21. Defense against insider attacks
22. Secure cooperation stimulation under noise and imperfect monitoring.