<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Application Of Proximal Point Method To The Problem Of Allocation Of Arcs In Telecommunication Networks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Igor</forename><forename type="middle">V</forename><surname>Konnov</surname></persName>
							<email>konn-igor@ya.ru</email>
						</author>
						<author>
							<persName><forename type="first">Alexey</forename><forename type="middle">Yu</forename><surname>Kashuba</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Erkki</forename><surname>Laitinen</surname></persName>
							<email>erkki.laitinen@oulu.fi</email>
						</author>
						<author>
							<persName><forename type="first">Sergei</forename><forename type="middle">S</forename><surname>Goncharov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Yuri</forename><forename type="middle">G</forename><surname>Evtushenko</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Kazan Federal University Kazan</orgName>
								<address>
									<postCode>420008</postCode>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">Kazan Federal University Kazan</orgName>
								<address>
									<postCode>420008</postCode>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">University of Oulu Oulu</orgName>
								<address>
									<postCode>FI-90014</postCode>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Application Of Proximal Point Method To The Problem Of Allocation Of Arcs In Telecommunication Networks</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A11E4B4E9F7114DEC8F671A143165427</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the paper we consider the problem of allocation of network resources in telecommunication networks with respect to both utility and reliability goals. We suggest a solution method based on a proximal point method for this problem. We present results of numerical results for the suggested method on test examples.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The current development of information technologies and telecommunications gives rise to new control problems related to efficient transmission of information and allocation of limited network resources. All these problems are determined on distributed systems where the spatial location of elements is taken into account. Due to strong variability and increasing demand of different wireless telecommunication services, fixed allocation rules usually lead to serious congestion effects and inefficient utilization of network resources despite the presence of very powerful processing and transmission devices. This situation forces one to replace the fixed allocation rules with more flexible mechanisms, which are based on proper mathematical models; see e.g. <ref type="bibr" target="#b0">[CW03]</ref>- <ref type="bibr" target="#b2">[WNH10]</ref>. For example, solution methods for network resource allocation based on optimization formulations of network manager problems and decomposition techniques were presented in <ref type="bibr" target="#b3">[KKL18,</ref><ref type="bibr" target="#b4">KK19]</ref>. In these problems, the goal function is the total network profit obtained from the total income of users payments and the implementation costs of the network. Otherwise, the total network users utility can serve as a goal function.</p><p>At the same time, wireless networks should be reliable with respect to various attacks. The most commonly seen attack in wireless networks are eavesdropping in which attackers aim at acquiring important/private information of users, jamming and distributed DDoS attacks which attempt to interfere and disrupt network operations by exhausting the resources available to legitimate systems and users. These attacks may lead to degrading the network performance and quality of service (QoS) as well as losing important data, reputations, and revenue; see e.g. [ZJT13, MZA13, ZJT13, LHW17]. Hence, the network resource allocation problem should take into account reliability estimates.</p><p>In <ref type="bibr" target="#b9">[KKL20]</ref>, we considered a problem of telecommunication network link resources allocation among users under reliability control of network connections with the pre-defined non-reliability level. For this problem were suggested a penalty method. This method attained a solution, but its convergence does not allow one to attain high accuracy of solutions.</p><p>In <ref type="bibr" target="#b10">[KKL21]</ref>, we considered a problem of allocation of link resources in telecommunication networks with respect to both utility and reliability goal. However, unlike [KKL20], we do not indicated any pre-defined non-reliability level. For this problem were suggested a dual decomposition method method.</p><p>In this paper, we consider the same problem of allocation of link resources in telecommunication networks as in <ref type="bibr" target="#b10">[KKL21]</ref>. Here we describe another solution method. First we suggest to use a proximal point method. Then by using the dual Lagrangian method with respect to the balance constraint, we replace the new formulated problem with an unconstrained optimization problem, where calculation of the cost function value leads to independent solution of single-dimensional problems. We present results of computational experiments which confirm the applicability of the new methods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Problem Description</head><p>We first take the optimal link distribution problem in computer and telecommunication data transmission networks, which was suggested in <ref type="bibr" target="#b11">[KMT98]</ref>. This model describes a network that contains a set of transmission links (arcs) L and accomplishes some submitted data transmission requirements from a set of selected pairs of origin-destination vertices I within a fixed time period. Denote by x i and α i the current and maximal value of data transmission for pair demand i, respectively, and by c l the capacity of link l. Each pair demand is associated with a unique data transmission path of links from the set of L i , hence each link l is associated uniquely with the set I l of pairs of origin-destination vertices, whose transmission paths contain this link. For each pair demand x i we denote by u i (x i ) the utility value at this data transmission volume. Then we can write the network utility maximization problem as follows:</p><p>max</p><formula xml:id="formula_0">→ i∈I u i (x i ) subject to i∈I l x i ≤ c l , l ∈ L; 0 ≤ x i ≤ α i , i ∈ I.</formula><p>If the functions u i (x i ) are concave, this is a convex optimization problem.</p><p>Let us now consider the same telecommunication network where the reliability factor should be taken into account. Namely, we associate the reliability to each arc flow and determine µ l (f l ) as the non-reliability of the l-th arc having the flow f l for l ∈ L. Then l∈L µ l (f l ) is the total network non-reliability and we formulate the network manager problem as follows:</p><formula xml:id="formula_1">min → l∈L µ l (f l ) − i∈I u i (x i ) or max → i∈I u i (x i ) − l∈L µ l (f l ) ,<label>(1)</label></formula><p>subject to</p><formula xml:id="formula_2">i∈I l x i = f l , l ∈ L; (2) 0 ≤ f l ≤ c l , l ∈ L; (3) 0 ≤ x i ≤ α i , i ∈ I.<label>(4)</label></formula><p>If the functions u i (x i ) and −µ l (f l ) are concave, this is a convex optimization problem with the polyhedral feasible set. However, solution of problem (1)-( <ref type="formula" target="#formula_2">4</ref>) is not so easy due to large dimensionality and inexact data. In this paper we consider the case where the functions u i (x i ) and −µ l (f l ) are concave.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Solution Method</head><p>Take number θ &gt; 0, points x 0 (0</p><formula xml:id="formula_3">≤ x 0 ≤ α), f 0 (0 ≤ f 0 ≤ c) and sequence of numbers {ε k } ({ε k } ↓ 0, ∞ k=0 ε k &lt; ∞).</formula><p>At the k-th iteration, k = 0, 1, ..., we have a pair (x k , f k ). We find (x k+1 , f k+1 ) as a solution of the problem min</p><formula xml:id="formula_4">→ l∈L µ l (f l ) + θ 2 (f l − f k l ) 2 + i∈I θ 2 (x i − x k i ) 2 − u i (x i ) (5) subject to i∈I l x i = f l , l ∈ L; (6) 0 ≤ f l ≤ c l , l ∈ L; (7) 0 ≤ x i ≤ α i , i ∈ I. (<label>8</label></formula><formula xml:id="formula_5">)</formula><p>with the accuracy ε k .</p><p>Let us define the Lagrange function of problem ( <ref type="formula">5</ref>)-(8) as follows:</p><formula xml:id="formula_6">L k (x, f, y) = l∈L µ l (f l ) + θ 2 (f l − f k l ) 2 + i∈I θ 2 (x i − x k i ) 2 − u i (x i ) + l∈L y l f l − i∈I l x i .</formula><p>By duality, we can replace problem (5)-( <ref type="formula" target="#formula_4">8</ref>) with the dual unconstrained optimization problem:</p><formula xml:id="formula_7">max y → ϕ(y),<label>(9)</label></formula><p>where</p><formula xml:id="formula_8">ϕ(y) = min 0≤x≤α,0≤f ≤c L k (x, f, y) = l∈L min 0≤f l ≤c l µ l (f l ) + θ 2 (f l − f k l ) 2 + y l f l + i∈I min 0≤xi≤αi θ 2 (x i − x k i ) 2 − u i (x i ) − x i l∈Li y l .<label>(10)</label></formula><p>Each of one-dimensional problem of (10) can be solved easily by explicit formulas. Function ϕ(y) in ( <ref type="formula" target="#formula_7">9</ref>) is concave,</p><formula xml:id="formula_9">∂ϕ(y) ∂y l = i∈I l x i (y) − f l (y l ), l ∈ L.</formula><p>These properties enable us to apply the usual Uzawa gradient method to find a solution of the dual problem (9):</p><formula xml:id="formula_10">y k+1 = y k + λ k ϕ (y k ), λ k &gt; 0.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Numerical Experiments</head><p>As part of the work, a numerical study of the suggested method was carried out. The method was implemented in C++ with a PC with the following facilities: Intel(R) Core(TM) i7-4500, CPU 1.80 GHz, RAM 6 Gb.</p><p>In the experiments, we used quadratic functions of utility of origin-destination pairs</p><formula xml:id="formula_11">u i (x i ) = u 1,i x 2 i + u 0,i x i , u 1,i &lt; 0, u 0,i &gt; 0, i ∈ I,</formula><p>linear functions of utility of origin-destination pairs</p><formula xml:id="formula_12">u i (x i ) = u 1,i x i + u 0,i , u 1,i , u 0,i &gt; 0, i ∈ I,</formula><p>and quadratic functions of non-reliability of arcs</p><formula xml:id="formula_13">µ l (f l ) = µ 1,l f 2 l + µ 0,l f l , µ 1,l , µ 0,l &gt; 0, l ∈ L.</formula><p>All the arcs and origin-destination pairs were indexed as l = 0, . . . , |L| − 1 (|L| is the cardinality of L) and i = 0, . . . , |I| − 1 (|I| is the cardinality I), respectively.</p><p>The coefficients µ 1,l , µ 0,l , u 0,i , and u 1,i were formed on the basis of trigonometric functions:</p><p>(i) for the case of quadratic functions</p><formula xml:id="formula_14">u i u 0,i = 2| sin(2i + 2)| + 2, u 1,i = −| cos(2i + 1)| − 1, (ii) for the case of linear functions u i u 0,i = | sin(2i + 2)| + 1, u 1,i = |2 sin(i + 2)| + 1, (ii) for the functions µ l µ 0,l = | cos(l + 1)| + 3, µ 1,l = 2| sin(2l + 2)| + 1.</formula><p>Let us denote the case of linear functions u i as L-case and the case of quadratic functions u i as Q-case.</p><p>The maximal arc flow capacity c l was selected in [1, 10] as follows:</p><formula xml:id="formula_15">c l = 10 * | cos(l + 3)| + 1.</formula><p>The maximal path flow capacity α i associated with a origin-destination pair was selected in [1, 7] as follows:</p><formula xml:id="formula_16">α i = 7 * | sin(i)| + 1.</formula><p>The parameter θ was fixed. We used three fixed values: 0.9, 0.5 and 5.0. The stepsize parameter λ k in the gradient method was also fixed and set to 0.6. The distribution of the available arcs across the origin-destination pairs was carried out either uniformly or according to the normal distribution law. In the gradient method we used two different initial points: the vector e of units and vector 100e.</p><p>We now introduce additional notations:</p><p>1. ε k is the accuracy of finding solution of the problem of k-th iteration, 2. T ε k ,1 and T ε k ,100 are the time (in seconds) of the method with the starting point e and 100e, respectively, 3. I ε k ,1 and I ε k ,100 are the numbers of iterations spent searching for a solution to the problem with the starting point e and 100e, respectively.</p><p>The gradient method was stopped if the norm ϕ (y k ) appeared less than ε k . We used next sequence of ε k :</p><formula xml:id="formula_17">ε 0 = 1, ε k = ε k−1 * 0.9, k = 1, 2, . . ..</formula><p>In Tables 1-4 we give the results of finding a solution of the problem with Q-case combination of functions and in Tables 5-6 -the results of finding a solution of the problem with L-case combination of functions.</p><p>In Tables <ref type="table" target="#tab_4">1 and 5</ref>, we give the results for the case where |L| = 310, θ = 0.9 and for different values |I|. In Tables 2-4 and 6, we give the results for the case where |I| = 310, θ = 0.5 (in Table <ref type="table" target="#tab_2">3</ref>), θ = 0.9 (in Tables <ref type="table" target="#tab_5">2 and  6</ref>), θ = 5.0 (in Table <ref type="table" target="#tab_3">4</ref>) and for different values |L|.</p><p>In Tables <ref type="table" target="#tab_7">7-8</ref>, we give results of Q-case for described method and result for dual method from <ref type="bibr" target="#b10">[KKL21]</ref>. For that let us introduce additional notations from <ref type="bibr" target="#b10">[KKL21]</ref>:</p><p>1. ε is the accuracy of finding solution of the problem, 2. T ε,1 and T ε,100 are the time (in seconds) of the method with the starting point e and 100e, respectively, 3. I ε,1 and I ε,100 are the numbers of iterations spent searching for a solution to the problem with the starting point e and 100e, respectively.</p><p>The results of computational experiments confirmed rather stable performance of the method.</p><p>From comparing the results in Tables 7-8 we see that in some cases dual method was slightly faster. Here we should note, that in dual method was used static accuracy for finding solution, but in proximal point method we used sequence of accuracies. This sequence can be generated in another way, which perhaps can improve speed of finding solution. We should also note that, unlike <ref type="bibr" target="#b10">[KKL21]</ref>, proximal point method can find solution when functions are linear. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Computations for |L| = 310, θ = 0.9, Q-case|I| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100</figDesc><table><row><cell>620 0.031</cell><cell>41</cell><cell>0.139</cell><cell>464</cell></row><row><cell>930 0.021</cell><cell>48</cell><cell>0.138</cell><cell>339</cell></row><row><cell>1240 0.027</cell><cell>48</cell><cell>0.188</cell><cell>340</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 :</head><label>2</label><figDesc>Computations for |I| = 310, θ = 0.9, Q-case|L| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100</figDesc><table><row><cell>620 0.015</cell><cell>41</cell><cell>0.452</cell><cell>1220</cell></row><row><cell>930 0.014</cell><cell>28</cell><cell>0.623</cell><cell>1191</cell></row><row><cell>1240 0.097</cell><cell>117</cell><cell>1.263</cell><cell>1804</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3 :</head><label>3</label><figDesc>Computations for |I| = 310, θ = 0.5, Q-case |L| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100</figDesc><table><row><cell>620 0.016</cell><cell>45</cell><cell>0.454</cell><cell>1232</cell></row><row><cell>930 0.018</cell><cell>34</cell><cell>0.638</cell><cell>1222</cell></row><row><cell>1240 0.043</cell><cell>59</cell><cell>1.230</cell><cell>1786</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 4 :</head><label>4</label><figDesc>Computations for |I| = 310, θ = 5.0, Q-case |L| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100</figDesc><table><row><cell>620 0.007</cell><cell>17</cell><cell>0.426</cell><cell>1151</cell></row><row><cell>930 0.005</cell><cell>11</cell><cell>0.604</cell><cell>1177</cell></row><row><cell>1240 0.042</cell><cell>51</cell><cell>1.166</cell><cell>1667</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 5 :</head><label>5</label><figDesc>Computations for |L| = 310, θ = 0.9, L-case|I| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100</figDesc><table><row><cell>620 0.023</cell><cell>75</cell><cell>0.122</cell><cell>419</cell></row><row><cell>930 0.047</cell><cell>109</cell><cell>0.116</cell><cell>278</cell></row><row><cell>1240 0.072</cell><cell>133</cell><cell>0.174</cell><cell>316</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 6 :</head><label>6</label><figDesc>Computations for |I| = 310, θ = 0.9, L-case|L| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100</figDesc><table><row><cell>620 0.028</cell><cell>77</cell><cell>0.367</cell><cell>1043</cell></row><row><cell>930 0.026</cell><cell>53</cell><cell>0.263</cell><cell>526</cell></row><row><cell>1240 0.098</cell><cell>119</cell><cell>1.063</cell><cell>1519</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head>Table 7 :</head><label>7</label><figDesc>Computations for ε = 10 −2 , ε k = ε k−1 * 0.9, |L| = 310 |I| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100 T ε,1 I ε,1 T ε,100 I ε,100</figDesc><table><row><cell>620 0.031</cell><cell>41</cell><cell>0.139</cell><cell>464 0.023</cell><cell>51 0.093</cell><cell>229</cell></row><row><cell>930 0.021</cell><cell>48</cell><cell>0.138</cell><cell>339 0.032</cell><cell>48 0.094</cell><cell>159</cell></row><row><cell>1240 0.027</cell><cell>48</cell><cell>0.188</cell><cell>340 0.031</cell><cell>51 0.094</cell><cell>150</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head>Table 8 :</head><label>8</label><figDesc>Computations for |I| = 310, θ = 0.9, ε = 10 −2 , ε k = ε k−1 * 0.9, |I| = 310|L| T ε k ,1 I ε k ,1 T ε k ,100 I ε k ,100 T ε,1 I ε,1 T ε,100 I ε,100In this work, the first author was supported by Russian Foundation for Basic Research, project No. 19-01-00431. The work of the second author was performed within the Russian Government Program of Competitive Growth of Kazan Federal University. The first and third authors were also supported by grant No. 331833 from Academy of Finland.</figDesc><table><row><cell>620 0.015</cell><cell>41</cell><cell>0.452</cell><cell>1220 0.031</cell><cell>58 0.365</cell><cell>691</cell></row><row><cell>930 0.014</cell><cell>28</cell><cell>0.623</cell><cell>1191 0.047</cell><cell>53 0.640</cell><cell>815</cell></row><row><cell>1240 0.097</cell><cell>117</cell><cell>1.263</cell><cell>1804 0.078</cell><cell>66 0.797</cell><cell>856</cell></row><row><cell>4.0.1 Acknowledgments</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Courcoubetis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Weber</surname></persName>
		</author>
		<title level="m">Pricing Communication Networks: Economics, Technology and Modelling</title>
				<meeting><address><addrLine>Chichester</addrLine></address></meeting>
		<imprint>
			<publisher>John Wiley &amp; Sons</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Resource Allocation in Wireless Networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Stanczak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wiczanowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Boche</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Theory and Algorithms</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Cognitive Radio Communications and Networks: Principles and Practice</title>
		<editor>A. M. Wyglinski, M. Nekovee, Y. T. Hou</editor>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Elsevier</publisher>
			<pubPlace>Amsterdam</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Dual methods for optimal allocation of telecommunication network resources with several classes of users</title>
		<author>
			<persName><forename type="first">I</forename><surname>Konnov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kashuba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Laitinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Comput. Appl</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="1" to="14" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Application of the conditional gradient method to a network resource allocation problem with several classes of users</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Konnov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Kashuba</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Physics: Conference Series</title>
		<imprint>
			<biblScope unit="volume">1158</biblScope>
			<biblScope unit="page" from="1" to="8" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>Art.</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">T</forename><surname>Zargar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Joshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Tipper</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="2046" to="2069" />
			<date type="published" when="2013-03">Mar. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Game theory meets network security and privacy</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Manshaei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Alpcan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Bacsar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-P</forename><surname>Hubaux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys (CSUR)</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="25" to="64" />
			<date type="published" when="2013-06">Jun. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Jamming attacks on wireless networks: A taxonomic survey</title>
		<author>
			<persName><forename type="first">S</forename><surname>Vadlamani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Eksioglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Medal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nandi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Production Economics</title>
		<imprint>
			<biblScope unit="volume">172</biblScope>
			<biblScope unit="page" from="76" to="94" />
			<date type="published" when="2016-02">Feb. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Applications of economic and pricing models for wireless network security: a survey</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">C</forename><surname>Luong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">T</forename><surname>Hoang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Niyato</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Han</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="2735" to="2767" />
			<date type="published" when="2017-07">Jul. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Penalty method for reliable allocations of wireless network resources</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Konnov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kashuba</surname></persName>
		</author>
		<author>
			<persName><surname>Laitinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2642</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Dual Decomposition Method for Reliable Allocations of Wireless Network Resources</title>
		<author>
			<persName><forename type="first">I</forename><surname>Konnov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kashuba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Laitinen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Eleventh International Conference on Mobile Services, Resources, and Users</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Rate control for communication networks: shadow prices, proportional fairness and stability</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">P</forename><surname>Kelly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Maulloo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Tan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Oper. Res. Soc</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="237" to="252" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
