default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 4,226 matches
- 2024
- Gregorius Airlangga, Denny Jean Cross Sihombing, Julius Bata, Anggun Fitrian Isnawati:
Optimizing Femtocell Networks: A Novel Game Theory Based Power Management Model for Enhanced SINR and Energy Efficiency. IEEE Access 12: 74444-74455 (2024) - You-Jung Han, Jihoon Moon, Jiyoung Woo:
Prediction of Churning Game Users Based on Social Activity and Churn Graph Neural Networks. IEEE Access 12: 101971-101984 (2024) - Sirisha Rani Kolli, Muhammad Zia Ur Rahman, Masreshaw D. Bayleyegn:
EECS-GT: Energy-Efficient Collaborative Sensing Model Using Game Theory for Wireless Sensor Networks. IEEE Access 12: 115657-115671 (2024) - Gina Sprint:
Social Networks and Large Language Models for Division I Basketball Game Winner Prediction. IEEE Access 12: 84774-84784 (2024) - Tong Wang, Chuanchuan You:
Adaptive Uplink Scheduling and UAV Association in UAV-Assisted OFDMA Cellular Networks: A Game-Theoretical Approach. IEEE Access 12: 63504-63514 (2024) - Baogang Li, Jia Liao, Xi Gong, Hongyin Xiang, Zhi Yang, Wei Zhao:
UAV-assisted ISAC network physical layer security based on Stackelberg game. Ad Hoc Networks 152: 103304 (2024) - Jun Wang, Weibin Jiang, Changchun Chen, Ruiquan Lin, Riqing Chen, Hongjun Wang:
A novel resource allocation method based on supermodular game in EH-CR-IoT networks. Ad Hoc Networks 152: 103309 (2024) - Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo:
A game-theoretic approach of cyberattack resilient constraint-following control for cyber-physical systems. Ad Hoc Networks 153: 103351 (2024) - Duc-Tuyen Ta, Nhan Nguyen-Thanh, Duy H. N. Nguyen, Van-Tam Nguyen:
A game-theoretical paradigm for collaborative and distributed power control in wireless networks. Ann. des Télécommunications 79(1-2): 1-14 (2024) - Hanaa ZainEldin, Nadiah A. Baghdadi, Samah A. Gamel, Mansourah Aljohani, Fatma M. Talaat, Amer Malki, Mahmoud Badawy, Mostafa A. El-Hosseini:
Active convolutional neural networks sign language (ActiveCNN-SL) framework: a paradigm shift in deaf-mute communication. Artif. Intell. Rev. 57(6): 162 (2024) - Shintaro Ueki, Fujio Toriumi, Toshiharu Sugawara:
Game-theoretic implications for uncovering the effects of virtual tipping in complex user networks. Appl. Netw. Sci. 9(1): 44 (2024) - Komal Singh Gill, Sharad Saxena, Anju Sharma, Arwinder Dhillon:
GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems. Clust. Comput. 27(8): 11645-11665 (2024) - Adnan Bayazeed, Khaldoun Khorzom, Mohamad Aljnidi:
Towards coordinating self-healing instances: Policy-based and non-cooperative game theory-based approaches with location awareness. Comput. Networks 254: 110827 (2024) - Wen Chen, Yuxiao Yang, Sibin Liu, Wenjing Hu:
Optimizing resource allocation for cluster D2D-assisted fog computing networks: A three-layer Stackelberg game approach. Comput. Networks 250: 110601 (2024) - Jiahui Jin, Zhendong Guo, Wenchao Bai, Biwei Wu, Xiang Liu, Weiwei Wu:
Congestion-aware Stackelberg pricing game in urban Internet-of-Things networks: A case study. Comput. Networks 246: 110405 (2024) - Sungwook Kim:
Hierarchical aerial offload computing algorithm based on the Stackelberg-evolutionary game model. Comput. Networks 245: 110348 (2024) - Liang Liu, Wuping Mao, Wenwei Li, Jie Duan, Guanyu Liu, Bingchuan Guo:
Edge computing offloading strategy for space-air-ground integrated network based on game theory. Comput. Networks 243: 110331 (2024) - Xavier Molinero, Fabián Riquelme, Maria J. Serna:
Social disruption games in signed networks. Commun. Nonlinear Sci. Numer. Simul. 132: 107910 (2024) - Chen Cheng, Linbo Zhai, Xiumin Zhu, Yujuan Jia, Yumei Li:
Dynamic task offloading and service caching based on game theory in vehicular edge computing networks. Comput. Commun. 224: 29-41 (2024) - Weiwei Jiang, Haoyu Han, Miao He, Weixi Gu:
When game theory meets satellite communication networks: A survey. Comput. Commun. 217: 208-229 (2024) - Xu Yan, Jinyao Liu, Ligang Cong, Xiaoqiang Di, Nannan Xie, Ziyang Xing, Hui Qi:
Game theory-based switch migration strategy for satellite networks. Comput. Commun. 221: 10-18 (2024) - Fang Ye, Hengyu Xu, Jingpeng Gao:
Relay selection in Underwater Acoustic Sensor Networks for QoS-based cooperative communication using game theory. Comput. Commun. 219: 104-115 (2024) - Complexity:
Retracted: Power Control for Full-Duplex Device-to-Device Underlaid Cellular Networks: A Stackelberg Game Approach. Complex. 2024: 9759820:1-9759820:1 (2024) - Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach. Comput. Secur. 139: 103696 (2024) - Wanyu Qiu, Chuanhe Huang, Zhengfa Li, M. Wasim Abbas Ashraf, Danxin Wang:
Traffic offloading for postdisaster rescue in UAV-assisted networks: A coalition formation game approach. Concurr. Comput. Pract. Exp. 36(10) (2024) - Yourong Chen, Hao Chen, Zhenyu Xiong, Banteng Liu, Zhangquan Wang, Meng Han:
Game theory attack pricing for mining pools in blockchain-based IoT. Digit. Commun. Networks 10(4): 973-988 (2024) - Hailin Feng, Dongliang Chen, Haibin Lv, Zhihan Lv:
Game theory in network security for digital twins in industry. Digit. Commun. Networks 10(4): 1068-1078 (2024) - Wenwen Gong, Huiping Wu, Xiaokang Wang, Xuyun Zhang, Yawei Wang, Yifei Chen, Mohammad Reza Khosravi:
Diversified and compatible web APIs recommendation based on game theory in IoT. Digit. Commun. Networks 10(4): 1198-1209 (2024) - Lihua Yin, Sixin Lin, Zhe Sun, Ran Li, Yuanyuan He, Zhiqiang Hao:
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy. Digit. Commun. Networks 10(2): 389-403 (2024) - N. M. Galieva, Alexey V. Korolev, Guennady A. Ougolnitsky:
Dynamic Resource Allocation Networks in Marketing: Comparing the Effectiveness of Control Methods. Dyn. Games Appl. 14(2): 362-395 (2024)
skipping 4,196 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-17 19:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint