#### Filter Results:

- Full text PDF available (341)

#### Publication Year

1978

2017

- This year (34)
- Last 5 years (210)
- Last 10 years (332)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Tansu Alpcan, Tamer Basar, Rayadurgam Srikant, Eitan Altman
- Wireless Networks
- 2002

We present a game-theoretic treatment of distributed power control in CDMA wireless systems. We make use of the conceptual framework of noncooperative game theory to obtain a distributed and market-based control mechanism. Thus, we address not only the power control problem, but also pricing and allocation of a single resource among several users. A cost… (More)

- Walid Saad, Zhu Han, M . Debbah, Are Hjorungnes, Tamer Basar
- IEEE Signal Processing Magazine
- 2009

In this tutorial, we provided a comprehensive overview of coalitional game theory, and its usage in wireless and communication networks. For this purpose, we introduced a novel classification of coalitional games by grouping the sparse literature into three distinct classes of games: canonical coalitional games, coalition formation games, and coalitional… (More)

- Shao Liu, Tamer Basar, Rayadurgam Srikant
- VALUETOOLS
- 2006

We introduce a new congestion control algorithm, called TCP-Illinois, which has many desirable properties for implementation in (very) high-speed networks. TCP-Illinois is a sender side protocol, which modifies the AIMD algorithm of the standard TCP (Reno, NewReno or SACK) by adjusting the increment/decrement amounts based on delay information. By using… (More)

- Akshay Kashyap, Tamer Basar, Rayadurgam Srikant
- 2006 IEEE International Symposium on Information…
- 2006

We study the distributed averaging problem on arbitrary connected graphs, with the additional constraint that the value at each node is an integer. This discretized distributed averaging problem models averaging in a network with the finite capacity channel (and in this form has applications to distributed detection in sensor networks) and load balancing in… (More)

- Tansu Alpcan, Tamer Basar, Altan T.B
- 2010

Cyber Security is a complex field that draws applications from variety of theoretical areas. This book is a Decision and Game theoretic book first with few hypothetical examples from Network Security. This is in contrary to the title highlighting that it is Network Security book. Over all the book is for graduate students and researchers who want learn… (More)

- Tamer Basar, Rayadurgam Srikant
- INFOCOM
- 2002

In this paper, we consider a network where each user is charged a fixed price per unit of bandwidth used, but where there is no congestion-dependent pricing. However, the transmission rate of each user is assumed to be a function of network congestion (like TCP), and the price per unit bandwidth. We are interested in answering the following question: how… (More)

- Orhan Çagri Imer, Serdar Yüksel, Tamer Basar
- Automatica
- 2006

In this paper, optimal control of linear time-invariant (LTI) systems over unreliable communication links is studied. The motivation of the problem comes from growing applications that demand remote control of objects over Internet-type or wireless networks where links are prone to failure. Depending on the availability of acknowledgment (ACK) signals, two… (More)

- Walid Saad, Zhu Han, Mérouane Debbah, Are Hjørungnes, Tamer Basar
- ArXiv
- 2009

Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications. With the emergence of cooperation as a new communication paradigm, and the need for self-organizing, decentralized, and autonomic networks, it has become imperative to seek suitable game theoretical tools that allow to analyze and study… (More)

- Venugopal V. Veeravalli, Tamer Basar, H. Vincent Poor
- IEEE Trans. Information Theory
- 1993

A decentral ized sequential detection problem is considered in which each one of a set of sensors receives a sequence of observat ions about the hypothesis. Each sensor sends a sequence of summary messages to the fusion center where a sequential test is carried out to determine the true hypothesis. A Bayesian framework for this problem is introduced, and… (More)

- Tansu Alpcan, Tamer Basar
- 2003

We investigate the basic trade-offs, analysis and decision processes involved in information security and intrusion detection, as well as possible application of game theoretic concepts to develop a formal decision and control framework. A generic model of a distributed intrusion detection system (IDS) with a network of sensors is considered, and two… (More)