Cognitive radio networking and security: a game-theoretic view (Record no. 11553)

000 -LEADER
fixed length control field 02837cam a2200253 a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100630s2011 enka b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780521762311
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.384
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Liu, K. J. Ray,
Dates associated with a name 1961-
245 10 - TITLE STATEMENT
Title Cognitive radio networking and security: a game-theoretic view
Remainder of title a game-theoretic view
Statement of responsibility, etc. K. J. Ray Liu, Beibei Wang.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cambridge ;
-- New York :
Name of publisher, distributor, etc. Cambridge University Press,
Date of publication, distribution, etc. 2011.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 601 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. [570]-597) and index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Part I. Cognitive Radio Communications and Cooperation: 1. Introduction to cognitive radios; 2. Game theory for cognitive radio networks; 3. Markov models for dynamic spectrum allocation; 4. Repeated open spectrum sharing game; 5. Pricing game for dynamic spectrum allocation; 6. A multi-winner cognitive spectrum auction game; 7. Evolutionary cooperative spectrum sensing game; 8. Anti-jamming stochastic game; 9. Opportunistic multiple access for cognitive networks; Part II. Resource Awareness and Learning: 10. Reinforcement learning for energy-aware communications; 11. Repeated game and learning for packet forwarding; 12. Dynamic pricing games for routing; 13. Connectivity-aware network lifetime optimization; 14. Connectivity-aware network maintenance and repair; Part III. Securing Mechanism and Strategies: 15. Trust modeling and evaluation; 16. Defense against routing disruptions; 17. Defense against injecting traffic attacks; 18. Attack-resistant cooperation stimulation; 19. Optimal strategies for cooperation stimulation; 20. Belief evaluation for cooperation enforcement; 21. Defense against insider attacks; 22. Secure cooperation stimulation under noise and imperfect monitoring.
520 ## - SUMMARY, ETC.
Summary, etc. "Recent increases in demand for cognitive radio technology have driven researchers and technologists to rethink the implications of the traditional engineering designs and approaches to communications and networking. One issue is that the traditional thinking is that one should try to have more bandwidth, more resources, and more of everything, while we have come to the realization that the problem is not that we don't have enough bandwidth or resources. It is rather that the bandwidth/resource utilization rates in many cases are too low. For examples, the TV bandwidth utilization nowadays in the USA is less than 6%, which is quite similar to that in most developed countries"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cognitive radio networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Game theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Wireless communication systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Beibei.
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Cover image
Uniform Resource Identifier <a href="http://assets.cambridge.org/97805217/62311/cover/9780521762311.jpg">http://assets.cambridge.org/97805217/62311/cover/9780521762311.jpg</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
          Central Library (CL) Central Library (CL) General Stacks 01/24/2013 Progressive International Agencies 10242.05   621.384 LIU SEECS011875 01/31/2013 01/31/2013 Book
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.