Fig. 3From: Resource allocation in a MAC with and without security via game theoretic learningSum-rate comparison for FMAC: multiple transmission ratesBack to article page