


default search action
Telecommunication Systems, Volume 47
Volume 47, Numbers 1-2, June 2011
- Tansu Alpcan

, Rachid El Azouzi
, Nahum Shimkin, Laura Wynter:
Guest Editorial - Special Issue on Game Theory in Communication Networks. 1-2 - Matthew Roughan

, Yin Zhang:
GATEway: symbiotic inter-domain traffic engineering. 3-17 - Nem Stefanovic, Lacra Pavel

:
A Lyapunov-Krasovskii stability analysis for game-theoretic based power control in optical links. 19-33 - Eitan Altman, Urtzi Ayesta, B. J. Prabhu:

Load balancing in processor sharing systems. 35-48 - László Toka, Pietro Michiardi:

Analysis of user-driven peer selection in peer-to-peer backup and storage systems. 49-63 - Shrutivandana Sharma, Demosthenis Teneketzis:

A game-theoretic approach to decentralized optimal power allocation for cellular networks. 65-80 - Georgios Koltsidas, Fotini-Niovi Pavlidou:

A game theoretical approach to clustering of ad-hoc and sensor networks. 81-93 - Ishai Menache, Nahum Shimkin:

Reservation-based distributed medium access in wireless collision channels. 95-108 - Elena Veronica Belmega, Samson Lasaulce, Mérouane Debbah, Marc Jungers

, Julien Dumont:
Power allocation games in wireless networks of multi-antenna terminals. 109-122 - Hongxia Shen, Tamer Basar:

Pricing under information asymmetry for a large population of users. 123-136 - Hamidou Tembine

, Eitan Altman, Rachid El Azouzi
, Yezekael Hayel:
Bio-inspired delayed evolutionary game dynamics with networking applications. 137-152 - Eitan Altman, Konstantin Avrachenkov

, Andrey Garnaev
:
Closed form solutions for water-filling problems in optimization and game frameworks. 153-164 - Benjamin Yolken, Nicholas Bambos

:
Game based capacity allocation for utility computing environments. 165-181
Volume 47, Numbers 3-4, August 2011
- Muhammad Khurram Khan

:
Guest editorial for special issue on biometric systems and applications. 183-184 - Birkan Tunç, Muhittin Gökmen:

Manifold learning for face recognition under changing illumination. 185-195 - Kwontaeg Choi, Kar-Ann Toh, Hyeran Byun:

An efficient incremental face annotation for large scale web services. 197-214 - Gang Pan, Lin Sun, Zhaohui Wu, Yueming Wang:

Monocular camera-based face liveness detection by combining eyeblink and scene context. 215-225 - Muhammad Khurram Khan

, Khaled Alghathbar, Jiashu Zhang:
Privacy-preserving and tokenless chaotic revocable face authentication scheme. 227-234 - Homayoon S. M. Beigi

, Judith A. Markowitz:
Standard audio format encapsulation (SAFE). 235-242 - Javier Galbally

, Julian Fiérrez
, Fernando Alonso-Fernandez
, Marcos Martinez-Diaz
:
Evaluation of direct attacks to fingerprint verification systems. 243-254 - Hyung Gu Lee, Andrew Beng Jin Teoh

, Jaihie Kim:
Biometric bits extraction through phase quantization based on feature level fusion. 255-273 - G. S. Badrinath, Naresh K. Kachhi, Phalguni Gupta:

Verification system robust to occlusion using low-order Zernike moments of palmprint sub-images. 275-290 - Sangkyu Baek, Jung Je Son, Bong Dae Choi:

Performance analysis of Push-To-Talk over IEEE 802.16e with sleep mode and idle mode. 291-302 - Javier Gomez

, Luis A. Mendez, Víctor Rangel, Andrew T. Campbell:
PCQoS: power controlled QoS tuning for wireless ad hoc networks. 303-321 - Per Hurtig, Anna Brunström:

SCTP: designed for timely message delivery? 323-336 - Olabisi Emmanuel Falowo

, H. Anthony Chan:
Effect of mobile terminal heterogeneity on call blocking/dropping probability in cooperative heterogeneous cellular networks. 337-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














