Acknowledgment |
|
xii | |
|
|
1 | (8) |
|
1.1 Overview and Motivation |
|
|
1 | (2) |
|
1.2 Intended Book Audience |
|
|
3 | (1) |
|
|
4 | (5) |
|
|
9 | (184) |
|
|
11 | (27) |
|
2.1 Fundamentals of Matching Theory |
|
|
11 | (6) |
|
2.2 Example 1: Student Project Allocation Model for LTE-Unlicensed |
|
|
17 | (11) |
|
2.3 Example 2: Stable Fixture Model in LTE V2X |
|
|
28 | (9) |
|
|
37 | (1) |
|
|
38 | (70) |
|
|
39 | (7) |
|
3.2 Example 1: Incentive Mechanisms for Device-to-Device Communications in Cellular Networks with Adverse Selection |
|
|
46 | (19) |
|
3.3 Example 2: Multidimensional Incentive Mechanism in Mobile Crowdsourcing with Moral Hazard |
|
|
65 | (24) |
|
3.4 Example 3: Financing Contract with Adverse Selection and Moral Hazard for Spectrum Trading in Cognitive Radio Networks |
|
|
89 | (16) |
|
|
105 | (3) |
|
|
108 | (4) |
|
4.1 Basics of a Stochastic Game |
|
|
108 | (1) |
|
4.2 Strategies, Equilibrium, and Key Results |
|
|
109 | (2) |
|
|
111 | (1) |
|
5 Games with Bounded Rationality |
|
|
112 | (11) |
|
5.1 Introduction to Bounded Rationality |
|
|
112 | (1) |
|
5.2 Prospect Theory: Motivation |
|
|
113 | (3) |
|
5.3 Foundations of Prospect Theory: Weighting Effects and Framing Effects |
|
|
116 | (5) |
|
5.4 Other Notions of Bounded Rationality |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (21) |
|
6.1 Introduction to Learning in Games |
|
|
123 | (2) |
|
6.2 Best Response Dynamics |
|
|
125 | (6) |
|
|
131 | (5) |
|
|
136 | (1) |
|
6.5 Reinforcement Learning |
|
|
137 | (2) |
|
6.6 Learning with Artificial Neural Networks |
|
|
139 | (3) |
|
|
142 | (2) |
|
7 Equilibrium Programming with Equilibrium Constraints |
|
|
144 | (24) |
|
7.1 Variational Inequalities |
|
|
145 | (2) |
|
7.2 Stackelberg Game Review |
|
|
147 | (2) |
|
7.3 Mathematical Programming with Equilibrium Constraints (MPEC) |
|
|
149 | (3) |
|
7.4 Equilibrium Programming with Equilibrium Constraints (EPEC) |
|
|
152 | (2) |
|
7.5 Example: Physical Layer Security |
|
|
154 | (13) |
|
|
167 | (1) |
|
|
168 | (25) |
|
8.1 Zero-Determinant Strategy |
|
|
168 | (21) |
|
|
189 | (4) |
|
|
193 | (266) |
|
9 Applications of Game Theory in the Internet of Things |
|
|
195 | (63) |
|
9.1 An Overview of the Internet of Things (IoT) |
|
|
197 | (3) |
|
9.2 Game Theoretic Models for Data Collection in the IoT |
|
|
200 | (15) |
|
9.3 Privacy Management and Optimal Pricing in People-Centric Sensing |
|
|
215 | (21) |
|
9.4 Tournament Model Based Optimized Incentive Mechanism for Mobile Crowdsourcing |
|
|
236 | (21) |
|
|
257 | (1) |
|
10 Applications of Game Theory in Network Virtualization |
|
|
258 | (12) |
|
10.1 Complementary Investment of Infrastructure and Service Providers in Wireless Network Virtualization |
|
|
258 | (2) |
|
|
260 | (3) |
|
|
263 | (3) |
|
10.4 Simulation Results and Analysis |
|
|
266 | (3) |
|
|
269 | (1) |
|
11 Applications of Game Theory in Cloud Networking |
|
|
270 | (45) |
|
|
271 | (5) |
|
11.2 Game Theoretic/Auction Models for Cloud Networking |
|
|
276 | (10) |
|
11.3 Cooperative Game for Mobile Cloud Resource Management |
|
|
286 | (15) |
|
11.4 Service Assurance in Cloud Computing Market with Incomplete Information |
|
|
301 | (13) |
|
|
314 | (1) |
|
12 Applications of Game Theory in Context-Aware Networks and Mobile Services |
|
|
315 | (32) |
|
12.1 Sponsored Content Game Theoretic Modeling |
|
|
316 | (19) |
|
12.2 College Admission Model for Facebook Content Caching |
|
|
335 | (11) |
|
|
346 | (1) |
|
13 Applications of Game Theory for Green Communication Networks |
|
|
347 | (30) |
|
13.1 Energy Harvesting and Green Communications |
|
|
348 | (6) |
|
13.2 Applications of Game Theory in Green Communications |
|
|
354 | (4) |
|
13.3 Stackelberg Game for RF-Powered Backscatter Cognitive Radio Networks |
|
|
358 | (18) |
|
|
376 | (1) |
|
|
377 | (48) |
|
14.1 Stable Marriage Model with Cheating for D2D Communications |
|
|
377 | (16) |
|
14.2 Contract-Based Trading for Small-Cell Caching System |
|
|
393 | (9) |
|
14.3 Traffic Offloading from Licensed Band to Unlicensed Band |
|
|
402 | (22) |
|
|
424 | (1) |
|
|
425 | (34) |
|
15.1 Security of Drone Delivery Systems |
|
|
425 | (13) |
|
15.2 Moving Target Defense in Wireless IoT Networks |
|
|
438 | (9) |
|
15.3 Critical Infrastructure Protection |
|
|
447 | (10) |
|
|
457 | (2) |
References |
|
459 | (35) |
Index |
|
494 | |