ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Game Theory for Networks: 11th International EAI Conference, GameNets 2022, Virtual Event, July 7–8, 2022, Proceedings

دانلود کتاب نظریه بازی برای شبکه ها: یازدهمین کنفرانس بین المللی EAI، GameNets 2022، رویداد مجازی، 7 تا 8 ژوئیه، 2022، مجموعه مقالات

Game Theory for Networks: 11th International EAI Conference, GameNets 2022, Virtual Event, July 7–8, 2022, Proceedings

مشخصات کتاب

Game Theory for Networks: 11th International EAI Conference, GameNets 2022, Virtual Event, July 7–8, 2022, Proceedings

ویرایش:  
نویسندگان:   
سری: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 457 
ISBN (شابک) : 3031231406, 9783031231407 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 373
[374] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 23 Mb 

قیمت کتاب (تومان) : 30,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Game Theory for Networks: 11th International EAI Conference, GameNets 2022, Virtual Event, July 7–8, 2022, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب نظریه بازی برای شبکه ها: یازدهمین کنفرانس بین المللی EAI، GameNets 2022، رویداد مجازی، 7 تا 8 ژوئیه، 2022، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب نظریه بازی برای شبکه ها: یازدهمین کنفرانس بین المللی EAI، GameNets 2022، رویداد مجازی، 7 تا 8 ژوئیه، 2022، مجموعه مقالات

این کتاب مجموعه مقالات داوری یازدهمین کنفرانس بین المللی EAI در نظریه بازی برای شبکه ها، GameNets 2022 است که به صورت یک رویداد مجازی در 7 تا 8 جولای 2022 برگزار شد.
25 مقاله ارائه شده بررسی و انتخاب شدند. از 64 ارسال آنها در بخش های موضوعی زیر سازماندهی شده اند: شبکه های بی سیم. اینترنت اشیا؛ و نظریه بازی.


توضیحاتی درمورد کتاب به خارجی

T​his book constitutes the refereed proceedings of the 11th EAI International Conference on Game Theory for Networks, GameNets 2022, held as a virtual event in July 7–8, 2022.
The 25 papers presented were reviewed and selected from 64 submissions. They are organized in the following topical sections: Wireless Networks; Internet of Things; and Game Theory.



فهرست مطالب

Preface
Organization
Contents
Wireless Networks
Block-Chain Abnormal Transaction Detection Method Based on Dynamic Graph Representation
	1 Introduction
	2 Related Work
	3 The Structure of DynAEGCN
		3.1 Problem Definition
		3.2 The Architecture of DynAEGCN
		3.3 Encoder
		3.4 Decoder
		3.5 Loss Function
	4 Simulation Analysis
		4.1 Datasets
		4.2 Contrast Models
		4.3 Experimental Results
	5 Conclusion
	References
Multi-service Communication Isolation of Underground Pipe Gallery Based on WiFi6
	1 Introduction
	2 Multi-service Communication Isolation Architecture
	3 Multi-service Communication Isolation Method for Underground Pipe Gallery Based on WiFi6
		3.1 Spectrum Isolation Scheme Based on Guardband
		3.2 Spatial Stream Isolation Scheme Based on Service Grouping
		3.3 Isolated Resource Allocation Method Based on Improved KM Algorithm
	4 Simulation
	5 Conclusion
	References
MU-PDR: A Method of Fingerprint Passive Positioning for WiFi6 Based on MU-RTS/CTS
	1 Introduction
	2 MU-PDR Fingerprint Positioning Frame
	3 MU-PDR Fingerprint Acquisition Method
		3.1 MU-RTS/CTS Mechanism
		3.2 MU-PDR Acquisition Method
	4 MU-PDR Fingerprint Positioning Method
		4.1 Offline Fingerprint Database Construction Method
		4.2 Online Real-Time Location Computation Method
	5 Simulation
		5.1 Positioning Accuracy
		5.2 Positioning Cost
	6 Conclusion
	References
The Optimal Layer of User-Specific Reconfigurable Intelligent Surfaces Structure for Uplink Communication System
	1 Introduction
	2 System Model
	3 The Optimal Energy Efficient Design
		3.1 Receiving Combining Vector Design
		3.2 Phase Shift Matrix Design
		3.3 Uplink Beamforming Vector Design
	4 Simulation and Discussion
	5 Conclusion
	References
A Sophisticated Anti-jamming Strategy for a Joint Radar and Communication System
	1 Introduction
	2  Basic Model of a Dual Purpose Communication-Radar System
	3  Jammer
	4 Mode Selection
		4.1 Sophisticated System
	5 Incomplete Information
	6 Best Response Strategies
	7 Equilibrium
	8 Discussion of the Results
	9 Conclusions
	A Appendix
		A.1 Proof of Proposition 1
		A.2 Proof of Proposition 2
		A.3 Proof of Theorem 1
	References
Internet of Things
Power Data Credible Decision-Making Mechanism Based on Federated Learning and Blockchain
	1 Introduction
	2 Related Work
	3 Power Data Distributed Computing Architecture Based on Alliance Chain
	4 Data Credible Decision-Making Mechanism
		4.1 Date Balance Method Combining SMOTE Algorithm and K-means Algorithm
		4.2 Load Forecasting Module Based on LSTM Neural Network
	5 Performance Evaluation
		5.1 Data Set
		5.2 Model Structure Design
		5.3 Result Analysis
	References
A Service Protection Mechanism of Deterministic Networking Based on Segment Routing
	1 Introduction
	2 Related Work
	3 Service Protection Mechanism SR-PREOF
		3.1 Path Calculation
		3.2 Segment Routing Policy Programming
		3.3 Data Plane Forwarding
		3.4 An Example of SR-PREOF Mechanism
	4 Performance Evaluation
		4.1 Simulation Settings
		4.2 Performance Evaluation Metrics
		4.3 Simulation Results and Analysis
	5 Conclusion
	References
Cloud-Edge Collaboration Based Power IoT Scene Perception Mechanism
	1 Introduction
	2 Related Work
	3 Cloud-edge Collaboration Based Scene Information Perception Architecture
		3.1 Instance Extraction
		3.2 Instance Perception
		3.3 Scene Fusion
	4 Neural Network Model Training Framework Based on Cloud-edge Collaboration
		4.1 EdgeNet Initialization
		4.2 EdgeNet Learning
		4.3 Sharelayer Update
	5 Simulation
		5.1 Settings
		5.2 Results
	6 Conclusion
	References
Task Allocation Mechanism of Power Internet of Things Based on Edge Routing Optimization
	1 Introduction
	2 Related Work
	3 Task Allocation Model Based on Multi-edge-node Cooperation
		3.1 Business Requests and Resources
		3.2 Delay
		3.3 Data Route
		3.4 Problem Model
	4 Algorithm
		4.1 Task Allocation and Sending Route Strategy
	5 Experimental Results and Analysis
	6 Conclusion
	References
Voluntary Data Preservation Mechanism in Base Station-Less Sensor Networks
	1 Introduction
	2 Related Work
	3 Data Preservation Problem Formulation
	4 Voluntary VCG Mechanism
		4.1 Payment Model
		4.2 The Voluntary VCG Mechanism
	5 Simulations
	6 Conclusion and Future Work
	References
Design and Implementation of Targeted Poverty Alleviation System Based on Blockchain Network
	1 Introduction
	2 System Design and Implementation
		2.1 System Architecture Design
		2.2 User Layer
		2.3 Application Layer
		2.4 Blockchain Layer
	3 The Practice of Blockchain in the Process of Targeted Poverty Alleviation
	4 Conclusion
	References
An Intent-Based Routing Scheme in Satellite IoT
	1 Introduction
	2 Related Work
	3 Model Building
		3.1 ISI System Model
		3.2 Interstellar Link Model
	4 Routing Scheme Design
	5 Simulation and Results
	6 Conclusion
	References
Game Theory
Interference Management in Terrestrial-Satellite Networks Using Stackelberg Game
	1 Introduction
	2 System Model and Stackelberg Game Formulation
		2.1 System Model
		2.2 Stackelberg Game Formulation
	3 Optimization Solutions of the Stackelberg Game
		3.1 Optimization Strategy of the Leader Sub-Game
		3.2 Optimization Strategy of the Follower Sub-Game
		3.3 An Joint Iterative Algorithm to Achieve Stackelberg Equilibrium
	4 Simulation Results and Discussion
	5 Conclusion
	References
Optimal Resource Allocation for Computation Offloading in Maritime Communication Networks: An Energy-Efficient Design via Matching Game
	1 Introduction
	2 System Model and Problem Formulation
		2.1 Problem Formulation
	3 Proposed Algorithm for Solving Problem (TEC)
		3.1 Layer Structure of Problem (TEC)
		3.2 Matching Game for Solving Channel Allocation in Problem (TEC-Bot)
		3.3 Analysis of Problem (TEC-Mid) for Solving alli
		3.4 Analysis of Problem (TEC-Top) for Solving si
	4 Simulation Performance
	5 Conclusion
	References
Game Theoretic Analysis of Resource Allocation in Multi-tiered Networks
	1 Introduction
		1.1 Our Contributions
	2 Network Model and Game Formulation
	3 Nash Equilibrium and Price of Anarchy
		3.1 Inefficiency of Equilibrium
	4 Determining Social Optimum
		4.1 Exchange-Method for Social Optimum
	5 Simulations
		5.1 Simulations to Analyze Nash Equilibrium and Price of Anarchy
	6 Conclusions
	References
Energy-Efficient Multi-cell NOMA Design via Coalition Formation Game
	1 Introduction
	2 System Model and Problem Formulation
	3 Coalition Formation Game Based Algorithm for User Grouping
	4 Solve the Robust Beamforming Design Problem
		4.1 SDR-Based Algorithm Design
		4.2 Rank-One Optimality Analysis
	5 Simulation Results
	6 Conclusions
	References
The Vaccination Game in Susceptible-Infected-Susceptible (SIS) Networks with Multipopulations
	1 Introduction
	2 The Model
		2.1 Background: Quasi-stationary Infection Probability
		2.2 States and Actions
		2.3 The Cost
	3 Main Result: A Multipopulation Equilibrium in Pure Strategies
	4 Futher Structure in the Single Population Case
		4.1 Existance of a Potential
		4.2 Threshold Equilibrium Policies
	5 Conclusion
	References
A Stochastic Bandwidth Scanning Game
	1 Introduction
	2 Non-Zero Sum Stochastic Game
	3 A Basic Example of Rational and Indifferent Behaviour
		3.1 Rational Players
		3.2 Strategies Based on Principle of Indifference
		3.3 Relations Between Detection Probabilities
	4 Solution of Non-Zero Sum Stochastic Game
		4.1 Equilibrium in Pure Strategies
		4.2 Equilibrium in Mixed Strategies
	5 Discussion of the Results
	6 Conclusions
	A  Appendix
		A.1  Proof of Lemma 1
		A.2  Proof of Theorem 1
		A.3  Proof of Theorem 2
		A.4  Proof of Theorem 3
		A.5  Proof of Theorem 4
		A.6  Proof of Theorem 5
		A.7  Proof of Theorem 6
	References
Port Capacity Leasing Games at Internet Exchange Points
	1 Introduction
	2 System Model and Properties
	3 Price of Anarchy Analysis
		3.1 Fixed Switch Capacity
		3.2 Variable Switch Capacity
	4 Simulations
		4.1 Simulation Setup
		4.2 Results and Observation
	5 Conclusion
	References
A Phase Transition in Large Network Games
	1 Introduction
	2 Nash Equilibrium in LQ Game
		2.1 Assumption
	3 Additive Perturbation in LQ Games
		3.1 Transitions in LQ Game
		3.2 Numerical Examples
	4 Multiplicative Perturbation in LQ Game
		4.1 Transitions in LQ Game
		4.2 Numerical Examples
	5 Interpretation
	6 Conclusion
	References
Dynamic Pricing for Tenants in an Automated Slicing Marketplace
	1 Introduction
	2 Slicing Market Game
		2.1 Admission Control Policies
	3 Theoretical Properties of the Market Game
	4 Numerical Evaluation
	5 Conclusion
	References
Service Function Chain Placement in Cloud Data Center Networks: A Cooperative Multi-agent Reinforcement Learning Approach
	1 Introduction
	2 Related Work
	3 Problem Formulation
	4 Multi-agent Reinforcement Learning Algorithm for SFC Placement
	5 Existing Algorithms for SFC Placement
	6 Performance Evaluation
	7 Conclusions and Future Work
	References
The Art of Concession in General Lotto Games
	1 Introduction
		1.1 General Lotto Games with Concessions
		1.2 Three-Player General Lotto Games with Concessions
		1.3 Related Works
	2 Model
		2.1 Background on General Lotto Games
		2.2 Three-Player General Lotto Games with Concessions
	3 Main Results
	4 Conclusions and Future Work
	A  Proof of Theorem 1
	B  Proof of Theorem 2
	References
Providing Slowdown Information to Improve Selfish Routing
	1 Introduction
	2 Model and Performance Metrics
		2.1 Routing Game
		2.2 Avoiding Perverse Signaling
	3 Related Work
	4 Our Contributions on Slowdown Signaling
		4.1 Providing Slowdown Information Can Harm Congestion on Some Networks
		4.2 Optimal Signaling Need Not Be Truthful
		4.3 Broader Implications for Heterogeneous Congestion Games
	5 Conclusion
	References
Budgeted Adversarial Network Resource Utilization Games
	1 Introduction
	2 Preliminaries and Results
		2.1 Problem Definitions and Notations
		2.2 Results
	3 Bipartite Routing Adversarial Game
	4 Network Routing Adversarial Game
	5 r-Commodity Network Routing Adversarial Game
	6 Conclusions
	A  Appendix
		A.1  Proofs
	References
Author Index




نظرات کاربران