The SCEAS System
Navigation Menu

Search the dblp DataBase


Tansu Alpcan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tansu Alpcan, Tamer Basar
    A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  2. Tansu Alpcan, Xingzhe Fan, Tamer Basar, Murat Arcak, John T. Wen
    Power Control for Multicell CDMA Wireless Networks: A Team Optimization Approach. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2005, pp:379-388 [Conf]
  3. Tansu Alpcan, Tamer Basar
    A hybrid systems model for power control in multicell wireless data networks. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2004, v:57, n:4, pp:477-495 [Journal]
  4. Tansu Alpcan, Tamer Basar
    A globally stable adaptive congestion control scheme for internet-style networks with delay. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:6, pp:1261-1274 [Journal]
  5. Tansu Alpcan, Tamer Basar, R. Srikant, Eitan Altman
    CDMA Uplink Power Control as a Noncooperative Game. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:6, pp:659-670 [Journal]
  6. Tansu Alpcan, Christian Bauckhage, Sachin Agarwal
    An Efficient Ontology-Based Expert Peering System. [Citation Graph (0, 0)][DBLP]
    GbRPR, 2007, pp:273-282 [Conf]
  7. Xiaoqing Zhu, Piyush Agrawal, Jatinder Pal Singh, Tansu Alpcan, Bernd Girod
    Rate allocation for multi-user video streaming over heterogenous access networks. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2007, pp:37-46 [Conf]
  8. Rainer Bye, Katja Luther, Seyit Ahmet Çamtepe, Tansu Alpcan, Sahin Albayrak, Bülent Yener
    Decentralized Detector Generation in Cooperative Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:37-51 [Conf]

  9. A game theoretic model for digital identity and trust in online communities. [Citation Graph (, )][DBLP]

  10. Tailoring Taxonomies for Efficient Text Categorization and Expert Finding. [Citation Graph (, )][DBLP]

  11. A Cooperative AIS Framework for Intrusion Detection. [Citation Graph (, )][DBLP]

  12. Security Games with Incomplete Information. [Citation Graph (, )][DBLP]

  13. Dynamic Resource Modeling for Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]

  14. Image retrieval and Web 2.0 - where can we go from here? [Citation Graph (, )][DBLP]

  15. Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing. [Citation Graph (, )][DBLP]

  16. A discrete-time parallel update algorithm for distributed learning. [Citation Graph (, )][DBLP]

  17. Characterization of Non-Manipulable and Pareto Optimal Resource Allocation Strategies for Interference Coupled Wireless Systems. [Citation Graph (, )][DBLP]

  18. Towards heterogeneous network convergence: policies and middleware architecture for efficient flow assignment, rate allocation and rate control for multimedia applications. [Citation Graph (, )][DBLP]

  19. The New Web: Characterizing AJAX Traffic. [Citation Graph (, )][DBLP]

  20. A Decentralized Bayesian Attack Detection Algorithm for Network Security. [Citation Graph (, )][DBLP]

  21. An intelligent knowledge sharing system for web communities. [Citation Graph (, )][DBLP]

  22. Brief Announcement: Cloud Computing Games: Pricing Services of Large Data Centers. [Citation Graph (, )][DBLP]

  23. An unsupervised hierarchical approach to document categorization. [Citation Graph (, )][DBLP]

  24. An Optimal Flow Assignment Framework for Heterogeneous Network Access. [Citation Graph (, )][DBLP]

  25. A Malware Detector Placement Game for Intrusion Detection. [Citation Graph (, )][DBLP]

  26. A stackelberg game for power control and channel allocation in cognitive radio networks. [Citation Graph (, )][DBLP]

  27. A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones. [Citation Graph (, )][DBLP]

  28. The "Spree" Expert Finding System. [Citation Graph (, )][DBLP]

  29. Distributed hypothesis testing with a fusion center: The conditionally dependent case. [Citation Graph (, )][DBLP]

  30. A stackelberg game for pricing uplink power in wide-band cognitive radio networks. [Citation Graph (, )][DBLP]

  31. A distributed machine learning framework. [Citation Graph (, )][DBLP]

  32. A control theoretic approach to noncooperative game design. [Citation Graph (, )][DBLP]

  33. Modeling dependencies in security risk management. [Citation Graph (, )][DBLP]

  34. A Robust Control Framework for Malware Filtering [Citation Graph (, )][DBLP]

  35. VANET Connectivity Analysis [Citation Graph (, )][DBLP]

  36. Distributed Rate Allocation Policies for Multi-Homed Video Streaming over Heterogeneous Access Networks [Citation Graph (, )][DBLP]

  37. Stochastic Games for Security in Networks with Interdependent Nodes [Citation Graph (, )][DBLP]

  38. Security Games with Decision and Observation Errors [Citation Graph (, )][DBLP]

  39. Fictitious Play with Time-Invariant Frequency Update for Network Security [Citation Graph (, )][DBLP]

  40. An Optimization and Control Theoretic Approach to Noncooperative Game Design [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002