[1]
|
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, et al., “Wireless sensor networks: a survey,” Computer Networks, Vol. 38, No. 4, pp. 393–422, March 2002.
|
[2]
|
W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” INFOCOM, New York, Vol. 3, pp. 1567–1576, June 2002.
|
[3]
|
T. Dam and K. Langendoen, “An adaptive energy- efficient MAC protocol for wireless sensor networks,”
ACM SenSys, Los Angeles CA, November 2003.
|
[4]
|
J. Polastre, J. Hill, and D. Celler, “Versatile low power media access for wireless sensor networks,” ACM SenSys, USA, pp. 95–107, November 2004.
|
[5]
|
A. El-Hoiydi and J. D. Decotignie, “WiseMAC: An ultra low power MAC protocol for the downlink of infrastructure wireless sensor networks,” ISCC, Egypt. pp. 244–251, June 2004.
|
[6]
|
P. Lin, C. Qiao, and X. Wang, “Medium access control with dynamic duty cycle for sensor networks,” WCNC, Atlanta, Georgia, March 2004.
|
[7]
|
T. van Dam, K. Langendoen, “A adaptive energy-efficient MAC protocol for wireless sensor networks,” ACM SenSys, USA, pp 171–180, November 2003.
|
[8]
|
P. D. Straffin, “Game theory and strategy,” The Mathematical Association of America, 1993.
|
[9]
|
A. Agah, S. K. Das, and K. A. Basu, “Game theory based approach for security in wireless sensor networks,” IPCCC, USA, pp. 259–263, April 2004.
|
[10]
|
R. Kannan, S. Sarangi, and S. S. Lyengar, “Sensor-centric energy-constrained reliable query routing for wireless sensor networks,” Journal of Parallel and Distributed Computing, Vol. 64, No. 7, pp. 839–852, July 2004.
|
[11]
|
S. Sengupta and M. Chatterjee, “Distributed power control in sensor networks: A game theoretic approach,” IWDC, India, pp. 508–519, December 2004.
|
[12]
|
X. Zhang, Y. Cai, and H. Zhang, “A game-theoretic dynamic power management policy on wireless sensor network,” ICCT, China, pp. 1–4, November 2006.
|
[13]
|
L. Zhao, L. Guo, K. Yang, and H. Zhang, “An Energy- efficient MAC Protocol for WSNs: Game-theoretic constraint optimization,” IEEE International Conference on Communication Systems, China, pp. 114–118, November 2008.
|
[14]
|
L. Zhao, L. Guo, J. Zhang, and H. Zhang, “A Game- theoretic MAC protocol for wireless sensor network,” Journal of IET Communications, Vol. 3, No. 8, pp. 1274–1283, August 2008.
|
[15]
|
M. S. Garey and D. S. Johnson, “Computers and Intractability: Guide to the theory of NP-completeness,” W. H. Freeman, New York, 1979.
|
[16]
|
T. Vercauteren, A. L. Toledo, and X. Wang, “Batch and sequential bayesian estimators of the number of active terminals in an IEEE 802.11 network,” IEEE Trans. on Signal Processing, Vol. 55, No. 2, pp. 437–450, January 2007.
|
[17]
|
G. Bianchi and I. Tinnirello, “Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network,” IEEE INFOCOM, Vol. 2, San Francisco, pp. 844–852, March 2003.
|
[18]
|
G. Bianchi, “Performance Analysis of the IEEE 802.11 distributed coordination function,” IEEE JSAC, Vol. 18, No. 3, pp. 535–547, March 2000.
|