Abstract is missing.
- A positioning of cooperative differential gamesJacob Christiaan Engwerda, P. V. Reddy. 1-8 [doi]
- Large-scale games in large-scale systemsHamidou Tembine. 9-17 [doi]
- Collaborative estimation of gradient direction by a formation of AUVsLara Briñón-Arranz, Alain Sarlette, Alexandre Seuret, Carlos Canudas de Wit. 18-27 [doi]
- HJB approach for motion planning and reachabilty analysisOlivier Bokanowski, Anna Désilles, Hasnaa Zidani. 28-36 [doi]
- A self-optimization method for coverage-capacity optimization in OFDMA networks with MIMORichard Combes, Zwi Altman, Eitan Altman. 37-46 [doi]
- Stability and asymptotic optimality of opportunistic schedulers in wireless systemsUrtzi Ayesta, Martin Erausquin, Matthieu Jonckheere, Ina Maria Verloop. 47-56 [doi]
- Stability of spatial wireless systems with random admissible-set schedulingNiek Bouman, Sem C. Borst, J. S. H. van Leeuwaarden. 57-65 [doi]
- Optimal base station placement: a stochastic method using interference gradient in downlink caseSalman Malik, Alonso Silva, Jean Marc Kelif. 66-73 [doi]
- Analytic performance evaluation of opportunistic spectrum access with detection errorsPatrick Tortelier. 74-80 [doi]
- Continuous polling with rerouting and applications to ferry assisted wireless LANsVeeraruna Kavitha. 81-90 [doi]
- Deriving generalised stochastic Petri net performance models from high-precision location tracking dataNikolas Anastasiou, Tzu-Ching Horng, William J. Knottenbelt. 91-100 [doi]
- Hierarchically constructed Petri-nets and product-formsPeter G. Harrison, Catalina M. Lladó. 101-110 [doi]
- A symbolic approach to quantitative analysis of preemptive real-time systems with non-Markovian temporal parametersLaura Carnevali, Johnny Giuntini, Enrico Vicario. 111-120 [doi]
- Exploiting multiformalism models for testing and performance evaluation in SIMTHESysEnrico Barbierato, Marco Gribaudo, Mauro Iacono. 121-130 [doi]
- Modeling network coded TCP throughput: a simple model and its validationMinji Kim, Muriel Médard, João Barros. 131-140 [doi]
- Network coding schemes for the multiple-access relay channelStefan Dierks, Onurcan Iscan, Christoph Hausl. 141-150 [doi]
- Joint network/channel decoding for heterogeneous multi-source/multi-relay cooperative networksCharly Poulliat, Marco Di Renzo. 151-156 [doi]
- Large-deviations analysis for energy-saving mechanisms in wireless networksKoen De Turck, Dieter Fiems, Stijn De Vuyst, Herwig Bruneel, Sabine Wittevrongel. 157-165 [doi]
- Explicit solutions for queues with hypo-exponential service time and applications to product-form analysisAndrea Marin, Samuel Rota Bulò. 166-175 [doi]
- Efficient parallelization of the Method of Moments for queueing networks using multi-modular algebraMichail Makaronidis, Giuliano Casale. 176-185 [doi]
- Efficient calculation of rare event probabilities in Markovian queueing networksLinar Mikeev, Werner Sandmann, Verena Wolf. 186-196 [doi]
- Bounding techniques for transient analysis of G-networks with catastrophesHind Castel-Taleb, Idriss Ismael-Aouled, Nihal Pekergin. 197-206 [doi]
- Acceleration of perfect sampling by skipping eventsFurcy Pin, Ana Busic, Bruno Gaujal. 207-216 [doi]
- Selfish routing revisited: degeneracy, evolution and stochastic fluctuationsPanayotis Mertikopoulos, Aris L. Moustakas. 217-226 [doi]
- Distributed stochastic approximation for constrained and unconstrained optimizationPascal Bianchi, Jérémie Jakubowicz. 227-233 [doi]
- A framework for optimization under limited informationTansu Alpcan. 234-243 [doi]
- On distributed power control and transceiver optimization in wireless networksSlawomir Stanczak, Michal Kaliszan, Mario Goldenbaum. 244-253 [doi]
- Model for sharing femto accessMariem Krichen, Johanne Cohen, Dominique Barth. 254-264 [doi]
- Simulating flow level bandwidth sharing with pareto distributed file sizesJulio Rojas-Mora, Tania Jiménez, Eitan Altman. 265-273 [doi]
- HS-measure: a hybrid clustering validity measure to interpret road traffic dataYosr Naïja, Kaouthar Blibech. 274-280 [doi]
- K-means and adaptive k-means algorithms for clustering DNS trafficQinghui Xu, Daniel Migault, Stéphane Sénécal, Stanislas Francfort. 281-290 [doi]
- Automatic protocol signature generation framework for deep packet inspectionGéza Szabó, Zoltán Turányi, László Toka, Sándor Molnár, Alysson Santos. 291-299 [doi]
- A survey on YouTube streaming serviceMajed Haddad, Eitan Altman, Rachid El Azouzi, Tania Jiménez, Salah-Eddine Elayoubi, Sana Ben Jamaa, Arnaud Legout, Ashwin Rao. 300-305 [doi]
- HASL: an expressive language for statistical verification of stochastic modelsPaolo Ballarini, Hilal Djafri, Marie Duflot, Serge Haddad, Nihal Pekergin. 306-315 [doi]
- Centrality maps and the analysis of city street networksThomas Courtat, Stéphane Douady, Catherine Gloaguen. 316-321 [doi]
- Socially optimal pricing of cloud computing resourcesIshai Menache, Asuman E. Ozdaglar, Nahum Shimkin. 322-331 [doi]
- Dynamic power allocation games in parallel multiple access channelsPanayotis Mertikopoulos, Elena Veronica Belmega, Aris L. Moustakas, Samson Lasaulce. 332-341 [doi]
- Uplink power control and subcarrier assignment for an OFDMA multicellular network based on game theoryGiacomo Bacci, Alessandro Bulzomato, Marco Luise. 342-351 [doi]
- Accurate and efficient simulation of bandwidth dynamics for peer-to-peer overlay networksAlexandros Gkogkas, Roberto Roverso, Seif Haridi. 352-361 [doi]
- Throughput and QoS pricing in wireless communicationAndrey Garnaev, Yezekael Hayel, Konstantin Avrachenkov, Eitan Altman. 362-371 [doi]
- More about base station location gamesFrançois Mériaux, Samson Lasaulce, Michel Kieffer. 372-380 [doi]
- Worst-case delay bounds with fixed priorities using network calculusAnne Bouillard, Aurore Junier. 381-390 [doi]
- Modeling quantitative requirements in SLAs with network calculusSebastian Vastag. 391-398 [doi]
- Network calculus: application to switched real-time networkingJean-Philippe Georges, Thierry Divoux, Eric Rondeau. 399-407 [doi]
- A temporal network calculus approach to service guarantee analysis of stochastic networksJing Xie, Yuming Jiang. 408-417 [doi]
- On the choice of the stochastic comparison method for multidimensional Markov chains analysisHind Castel-Taleb, Nihal Pekergin. 418-424 [doi]
- Optimal index rules for single resource allocation to stochastic dynamic competitorsPeter Jacko. 425-433 [doi]
- /N/N + R queueAlexander I. Zeifman, Sergey Shorgin, Anna Korotysheva, Vladimir Bening. 434-438 [doi]
- SMCSolverMaxime Cordy, Marie-Ange Remiche. 439-446 [doi]
- A Taylor series expansions approach to queues with train arrivalsKoen De Turck, Dieter Fiems, Sabine Wittevrongel, Herwig Bruneel. 447-455 [doi]
- Two-buffer fluid models with multiple ON-OFF inputs and threshold assistanceGuy Latouche, Giang T. Nguyen, Zbigniew Palmowski. 456-462 [doi]
- Hamiltonian transition matricesKonstantin Avrachenkov, Ali Eshragh, Jerzy A. Filar. 463-466 [doi]
- Coopetition: practical methodology for efficient sharing of radio resources in wireless networksMarcin Parzy, Hanna Bogucka. 467-475 [doi]
- Graph-based coalitional games: an analysis via characteristicsFrank Nebel. 476-485 [doi]
- Low complexity resource allocation for OFDMA based on coalitional game theoryFarshad Shams, Giacomo Bacci, Marco Luise. 486-495 [doi]
- The jamming game in an OFDM settingFrancesco Renna, Nicola Laurenti, Yih-Chun Hu. 496-505 [doi]
- Adversarial behavior in network mechanism designAnil Kumar Chorppath, Tansu Alpcan. 506-514 [doi]
- Power allocation in team jamming games in wireless ad hoc networksSourabh Bhattacharya, Ali Khanafer, Tamer Basar. 515-524 [doi]
- Routing games in the many players regimeEitan Altman, Richard Combes, Zwi Altman, Sylvain Sorin. 525-527 [doi]
- Cooperative virtual machine management for multi-organization cloud computing environmentDusit Niyato, Kun Zhu, Ping Wang. 528-537 [doi]
- Universal linear pricing for multiple access and broadcast channels under QoS requirementsFei Shen, Eduard A. Jorswieck. 538-547 [doi]
- The price of re-establishing perfect, almost perfect or public monitoring in games with arbitrary monitoringMaël Le Treust, Samson Lasaulce. 548-557 [doi]
- Revenue maximization in spectrum auction for dynamic spectrum accessAli Kakhbod, Ashutosh Nayyar, Demosthenis Teneketzis. 558-564 [doi]
- Learning to use the spectrum in self-configuring heterogenous networks: a logit equilibrium approachSamir Medina Perlaza, Samson Lasaulce, Hamidou Tembine, Mérouane Debbah. 565-571 [doi]
- Mean field stochastic games for SINR-based medium access controlHamidou Tembine, Pedro Vilanova, Mohamad Assaad, Mérouane Debbah. 572-581 [doi]
- Circular harmonic decomposition approach for numerical inversion of circular Radon transformsGaël Rigaud, Maï K. Nguyen, Alfred K. Louis. 582-591 [doi]
- 3D modelling of ElectroMagnetic time reversal: localization of a dielectric object in a half-spaceMehdi Benhamouche, Lionel Pichon, Laurent Bernard, Dominique Lesselier. 592-596 [doi]
- Regularizing parameter estimation for Poisson noisy image restorationMikael Carlavan, Laure Blanc-Féraud. 597-601 [doi]
- Searchlight CT: a new reconstruction method for collimated X-ray tomographyRobert Azencott, Anando Sen, Bernhard G. Bodmann, King C. Li, Demetrio Labate, Xiaobo Zhou. 602-606 [doi]
- Topology optimization for solving electromagnetic inverse problemJonathan Denies, Hamid Ben Ahmed, Bruno Dehez. 607-611 [doi]
- Imaging and detection of cracks in metallic structures with eddy current sensorsDominique Placko, Thierry Bore, Pierre-Yves Joubert. 612-620 [doi]
- Linear inverse problems with various noise models and mixed regularizationsFrançois-Xavier Dupé, Jalal Fadili, Jean-Luc Starck. 621-626 [doi]
- Recursive inference for inverse problems using variational Bayes methodologyAnthony Quinn. 627-635 [doi]
- On the multi-antenna wiretap channel with delayed CSI at the transmitterMari Kobayashi, Pablo Piantanida, Shlomo Shamai, Sheng Yang. 636-640 [doi]
- Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channelsLaura Luzzi, Matthieu R. Bloch. 641-647 [doi]
- Physical layer authentication over an OFDM fading wiretap channelPaolo Baracca, Nicola Laurenti, Stefano Tomasin. 648-657 [doi]
- MAC with partially cooperating encoders and security constraintsZohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendorpe. 658-664 [doi]
- Secure distributed lossless compression with side information at the eavesdropperJoffrey Villard, Pablo Piantanida. 665-672 [doi]
- Relay and jammer cooperation as a coalitional game in secure cooperative wireless networksRongqing Zhang, Lingyang Song, Zhu Han, Bingli Jiao. 673-678 [doi]
- Achievable secrecy rates for wiretap OFDM with QAM constellationsFrancesco Renna, Nicola Laurenti, H. Vincent Poor. 679-686 [doi]