@inproceedings(ADRST-formats11, author = "Parosh Abdulla and Giorgio Delzanno and Othmane Rezine and Arnaud Sangnier and Riccardo Traverso", year = "2011", title = "On the Verification of Timed Ad Hoc Networks", booktitle = "Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11)", series = "Lecture Notes in Computer Science", publisher = "Springer", doi = "10.1007/978-3-642-24310-3\_18", ) @inproceedings(aloha, author = "Norman Abramson", year = "1970", title = "The Aloha system: another alternative for computer communications", booktitle = "Proceedings of the November 17-19, 1970, fall joint computer conference", series = "AFIPS '70 (Fall)", publisher = "ACM", address = "New York, NY, USA", pages = "281--285", doi = "10.1145/1478462.1478502", ) @book(zigbee, author = "ZigBee Alliance", year = "2005", title = "ZigBee specification 1.0", ) @inproceedings(EURECOM_1656, author = "Eitan Altman and Nicolas Bonneau and Merouane Debbah and Giuseppe Caire", year = "2005", title = "An evolutionary game perspective to Aloha with power control", booktitle = "ITC 19, 19th International Teletraffic Congress, August 29 - September 2, 2005", ) @inproceedings(Alur01optimalpaths, author = "Rajeev Alur and Salvatore La Torre and George J. Pappas", year = "2001", title = "Optimal Paths in Weighted Timed Automata", booktitle = "HSCC'01", publisher = "Springer", pages = "49--62", doi = "10.1016/j.tcs.2003.10.038", ) @inproceedings(HSCC01, author = "Gerd Behrmann and Ansgar Fehnker and Thomas Hune and Kim Guldstrand Larsen and Paul Pettersson and Judi Romijn and Frits W. Vaandrager", year = "2001", title = "Minimum-Cost Reachability for Priced Timed Automata", booktitle = "HSCC", pages = "147--161", ) @article(WMTL08, author = "Patricia Bouyer and Kim Guldstrand Larsen and Nicolas Markey", year = "2008", title = "Model Checking One-Clock Priced Timed Automata", journal = "Logical Methods in Computer Science", volume = "4", number = "2", doi = "10.2168/LMCS-4(2:9)2008", ) @book(LCA-BOOK-2006-001, author = "Levente Buttyan and Jean-Pierre Hubaux", year = "2008", title = "Security and {C}ooperation in {W}ireless {N}etworks", publisher = "Cambridge University Press", address = "Cambridge", ) @techreport(Cagalj04oncheating, author = "Mario Cagalj and Saurabh Ganeriwal and Imad Aad and Jean-Pierre Hubaux", year = "2004", title = "On Cheating in CSMA/CA Ad Hoc Networks", type = "Technical Report", institution = "Proc. IEEE INFOCOM 2005", ) @inproceedings(CONCUR00, author = "Franck Cassez and Kim Guldstrand Larsen", year = "2000", title = "The Impressive Power of Stopwatches", booktitle = "CONCUR", pages = "138--152", doi = "10.1007/3-540-44618-4\_12", ) @inproceedings(TransmissionProbability, author = "Johannes Dams and Thomas Kesselheim and Berthold Vocking", year = "2011", title = "Transmission Probability Control Game with Limited Energy", booktitle = "IEEE DySPAN, to appear", doi = "10.1109/DYSPAN.2011.5936232", ) @inproceedings(uppaal_formats, author = "Alexandre David and Kim G. Larsen and Axel Legay and Marius Mikucionis and Danny Poulsen and Jonas van Vliet and Zheng Wang", year = "2011", title = "Statistical Model Checking for Networks of Priced Timed Automata", booktitle = "Proceedings of Formal Modeling and Analysis of Timed Systems", publisher = "LNCS", address = "Aalborg", pages = "80--96", doi = "10.1007/978-3-642-24310-3", ) @inproceedings(UPPAAL_SMC, author = "Alexandre David and Kim G. Larsen and Axel Legay and Marius Mikucionis and Zheng Wang", year = "2011", title = "Time for Statistical Model Checking of Real-time Systems", booktitle = "Proceedings of the 23$^{rd}$ International Conference on Computer Aided Verification (CAV)", series = "LNCS", publisher = "Springer Verlag", pages = "349--355", doi = "10.1007/978-3-642-22110-1\_27", ) @article(Felegyhezi06nashequilibria, author = "Mark Felegyhazi and Student Member and Jean pierre Hubaux and Senior Member and Levente Buttyan", year = "2006", title = "Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks", journal = "IEEE Transactions on Mobile Computing", volume = "5", doi = "10.1109/TMC.2006.68", ) @inproceedings(conf/pimrc/GhasemiF08, author = "Abdorasoul Ghasemi and Karim Faez", year = "2008", title = "A nash power-aware MAC game for ad hoc wireless networks", booktitle = "PIMRC", publisher = "IEEE", pages = "1--5", doi = "10.1109/PIMRC.2008.4699511", ) @article(game_theory, author = "Ehud Kalai", year = "1991", title = "Game theory: Analysis of conflict : By Roger B. Myerson, Harvard Univ. 568 pp.", journal = "Games and Economic Behavior", volume = "3", number = "3", ) @article(UPPAAL, author = "Kim G.\ Larsen and Paul Pettersson and Wang Yi", year = "1997", title = "{{\sc Uppaal}\ in a Nutshell}", journal = "Int.\ Journal on Software Tools for Technology Transfer", volume = "1", number = "1--2", pages = "134--152", doi = "10.1007/s100090050010", ) @article(SMC_Legay, author = "Axel Legay and Beno\^{\i }t Delahaye", year = "2010", title = "Statistical Model Checking : An Overview", journal = "CoRR", volume = "abs/1005.1327", doi = "10.1007/978-3-642-16612-9\_11", ) @article(Mackenzie2001, author = "A. B. Mackenzie and S. B. Wicker", year = "2001", title = "{Game theory and the design of self-configuring, adaptive wireless networks}", journal = "Communications Magazine, IEEE", volume = "39", number = "11", pages = "126--131", doi = "10.1109/35.965370", ) @inproceedings(cognitive, author = "J. Neel and R. Menon and A. MacKenzie and J. Reed", year = "2005", title = "Using game theory to aid the design of physical layer cognitive radio algorithms", booktitle = "Conf. on Economics, Technology and Policy of Unlicensed Spectrum", ) @inproceedings(Rao2008, author = "P Nuggehalli and M Sarkar and K Kulkarni and R Rao", year = "2008", title = "A Game-Theoretic Analysis of QoS in Wireless MAC", booktitle = "INFOCOM 2008. The 27th Conference on Computer Communications. IEEE", pages = "1903--1911", doi = "10.1109/INFOCOM.2008.254", ) @book(IEEE.802.15.4, author = "IEEE Computer Society", year = "2003", title = "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)", ) @article(wirelessgametheory, author = "V. Srivastava and J. Neel and A.B. Mackenzie and R. Menon and L.A. Dasilva and J.E. Hicks and J.H. Reed and R.P. Gilles", year = "2005", title = "Using game theory to analyze wireless ad hoc networks", journal = "Communications Surveys Tutorials, IEEE", volume = "7", number = "4", pages = "46 -- 56", doi = "10.1109/COMST.2005.1593279", ) @phdthesis(SMC_Yonas, author = "Hakan L. S. Younes", year = "2005", title = "Verification and Planning for Stochastic Processes with Asynchronous Events", school = "Carnegie Mellon University", ) @article(Zakiuddin200567, author = "Irfan Zakiuddin and Tim Hawkins and Nick Moffat", year = "2005", title = "Towards A Game Theoretic Understanding of Ad-Hoc Routing", journal = "Electronic Notes in Theoretical Computer Science", volume = "119", number = "1", pages = "67 -- 92", doi = "10.1016/j.entcs.2004.07.009", )