Resource allocation in a MAC with and without security via game theoretic learning. Shah, S. M., A, K. C., & Sharma, V. EURASIP J. Wireless Comm. and Networking, 2017:116, 2017. Paper doi bibtex @article{DBLP:journals/ejwcn/ShahAS17,
author = {Shahid Mehraj Shah and
Krishna Chaitanya A and
Vinod Sharma},
title = {Resource allocation in a {MAC} with and without security via game
theoretic learning},
journal = {{EURASIP} J. Wireless Comm. and Networking},
volume = {2017},
pages = {116},
year = {2017},
url = {https://doi.org/10.1186/s13638-017-0901-8},
doi = {10.1186/s13638-017-0901-8},
timestamp = {Thu, 28 Dec 2017 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/ejwcn/ShahAS17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"N3LSDRgW9fmSrGpsx","bibbaseid":"shah-a-sharma-resourceallocationinamacwithandwithoutsecurityviagametheoreticlearning-2017","downloads":0,"creationDate":"2019-03-06T15:26:46.052Z","title":"Resource allocation in a MAC with and without security via game theoretic learning","author_short":["Shah, S. M.","A, K. C.","Sharma, V."],"year":2017,"bibtype":"article","biburl":"https://dblp.org/pid/151/6680.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Shahid","Mehraj"],"propositions":[],"lastnames":["Shah"],"suffixes":[]},{"firstnames":["Krishna","Chaitanya"],"propositions":[],"lastnames":["A"],"suffixes":[]},{"firstnames":["Vinod"],"propositions":[],"lastnames":["Sharma"],"suffixes":[]}],"title":"Resource allocation in a MAC with and without security via game theoretic learning","journal":"EURASIP J. Wireless Comm. and Networking","volume":"2017","pages":"116","year":"2017","url":"https://doi.org/10.1186/s13638-017-0901-8","doi":"10.1186/s13638-017-0901-8","timestamp":"Thu, 28 Dec 2017 00:00:00 +0100","biburl":"https://dblp.org/rec/bib/journals/ejwcn/ShahAS17","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ejwcn/ShahAS17,\n author = {Shahid Mehraj Shah and\n Krishna Chaitanya A and\n Vinod Sharma},\n title = {Resource allocation in a {MAC} with and without security via game\n theoretic learning},\n journal = {{EURASIP} J. Wireless Comm. and Networking},\n volume = {2017},\n pages = {116},\n year = {2017},\n url = {https://doi.org/10.1186/s13638-017-0901-8},\n doi = {10.1186/s13638-017-0901-8},\n timestamp = {Thu, 28 Dec 2017 00:00:00 +0100},\n biburl = {https://dblp.org/rec/bib/journals/ejwcn/ShahAS17},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Shah, S. M.","A, K. C.","Sharma, V."],"key":"DBLP:journals/ejwcn/ShahAS17","id":"DBLP:journals/ejwcn/ShahAS17","bibbaseid":"shah-a-sharma-resourceallocationinamacwithandwithoutsecurityviagametheoreticlearning-2017","role":"author","urls":{"Paper":"https://doi.org/10.1186/s13638-017-0901-8"},"downloads":0},"search_terms":["resource","allocation","mac","without","security","via","game","theoretic","learning","shah","a","sharma"],"keywords":[],"authorIDs":[],"dataSources":["zuqrM9zBSf79v6axB"]}