Pricing for distributed resource allocation in MAC without SIC under QoS requirements with malicious users.
Fei ShenEduard A. JorswieckAnil Kumar ChorppathHolger BochePublished in: WiOpt (2014)
Keyphrases
- qos requirements
- malicious users
- distributed resource allocation
- resource allocation
- resource management
- quality of service
- medium access
- learning agents
- ip networks
- scheduling algorithm
- multi agent systems
- response time
- end to end
- user privacy
- sensitive data
- web services
- ad hoc networks
- network resources
- sensitive information
- data transmission
- real time
- information security
- autonomous agents