Search the dblp DataBase
Tansu Alpcan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tansu Alpcan , Tamer Basar A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Tansu Alpcan , Xingzhe Fan , Tamer Basar , Murat Arcak , John T. Wen Power Control for Multicell CDMA Wireless Networks: A Team Optimization Approach. [Citation Graph (0, 0)][DBLP ] WiOpt, 2005, pp:379-388 [Conf ] Tansu Alpcan , Tamer Basar A hybrid systems model for power control in multicell wireless data networks. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2004, v:57, n:4, pp:477-495 [Journal ] Tansu Alpcan , Tamer Basar A globally stable adaptive congestion control scheme for internet-style networks with delay. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2005, v:13, n:6, pp:1261-1274 [Journal ] Tansu Alpcan , Tamer Basar , R. Srikant , Eitan Altman CDMA Uplink Power Control as a Noncooperative Game. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2002, v:8, n:6, pp:659-670 [Journal ] Tansu Alpcan , Christian Bauckhage , Sachin Agarwal An Efficient Ontology-Based Expert Peering System. [Citation Graph (0, 0)][DBLP ] GbRPR, 2007, pp:273-282 [Conf ] Xiaoqing Zhu , Piyush Agrawal , Jatinder Pal Singh , Tansu Alpcan , Bernd Girod Rate allocation for multi-user video streaming over heterogenous access networks. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2007, pp:37-46 [Conf ] Rainer Bye , Katja Luther , Seyit Ahmet Çamtepe , Tansu Alpcan , Sahin Albayrak , Bülent Yener Decentralized Detector Generation in Cooperative Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] SSS, 2007, pp:37-51 [Conf ] A game theoretic model for digital identity and trust in online communities. [Citation Graph (, )][DBLP ] Tailoring Taxonomies for Efficient Text Categorization and Expert Finding. [Citation Graph (, )][DBLP ] A Cooperative AIS Framework for Intrusion Detection. [Citation Graph (, )][DBLP ] Security Games with Incomplete Information. [Citation Graph (, )][DBLP ] Dynamic Resource Modeling for Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP ] Image retrieval and Web 2.0 - where can we go from here? [Citation Graph (, )][DBLP ] Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing. [Citation Graph (, )][DBLP ] A discrete-time parallel update algorithm for distributed learning. [Citation Graph (, )][DBLP ] Characterization of Non-Manipulable and Pareto Optimal Resource Allocation Strategies for Interference Coupled Wireless Systems. [Citation Graph (, )][DBLP ] Towards heterogeneous network convergence: policies and middleware architecture for efficient flow assignment, rate allocation and rate control for multimedia applications. [Citation Graph (, )][DBLP ] The New Web: Characterizing AJAX Traffic. [Citation Graph (, )][DBLP ] A Decentralized Bayesian Attack Detection Algorithm for Network Security. [Citation Graph (, )][DBLP ] An intelligent knowledge sharing system for web communities. [Citation Graph (, )][DBLP ] Brief Announcement: Cloud Computing Games: Pricing Services of Large Data Centers. [Citation Graph (, )][DBLP ] An unsupervised hierarchical approach to document categorization. [Citation Graph (, )][DBLP ] An Optimal Flow Assignment Framework for Heterogeneous Network Access. [Citation Graph (, )][DBLP ] A Malware Detector Placement Game for Intrusion Detection. [Citation Graph (, )][DBLP ] A stackelberg game for power control and channel allocation in cognitive radio networks. [Citation Graph (, )][DBLP ] A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones. [Citation Graph (, )][DBLP ] The "Spree" Expert Finding System. [Citation Graph (, )][DBLP ] Distributed hypothesis testing with a fusion center: The conditionally dependent case. [Citation Graph (, )][DBLP ] A stackelberg game for pricing uplink power in wide-band cognitive radio networks. [Citation Graph (, )][DBLP ] A distributed machine learning framework. [Citation Graph (, )][DBLP ] A control theoretic approach to noncooperative game design. [Citation Graph (, )][DBLP ] Modeling dependencies in security risk management. [Citation Graph (, )][DBLP ] A Robust Control Framework for Malware Filtering [Citation Graph (, )][DBLP ] VANET Connectivity Analysis [Citation Graph (, )][DBLP ] Distributed Rate Allocation Policies for Multi-Homed Video Streaming over Heterogeneous Access Networks [Citation Graph (, )][DBLP ] Stochastic Games for Security in Networks with Interdependent Nodes [Citation Graph (, )][DBLP ] Security Games with Decision and Observation Errors [Citation Graph (, )][DBLP ] Fictitious Play with Time-Invariant Frequency Update for Network Security [Citation Graph (, )][DBLP ] An Optimization and Control Theoretic Approach to Noncooperative Game Design [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.303secs