-
1
-
-
1542299118
-
Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
-
L. Anderegg and S. Eidenbenz, "Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents", ACM Mobicom 2003, pp. 245-259.
-
(2003)
ACM Mobicom
, pp. 245-259
-
-
Anderegg, L.1
Eidenbenz, S.2
-
3
-
-
0242696192
-
Performance analysis of the confidant protocol: Cooperation of nodesfairness in dynamic ad-hoc networks
-
S. Buchegger and J. L. Boudec, "Performance analysis of the confidant protocol: Cooperation of nodesfairness in dynamic ad-hoc networks", ACM MobiHoc 2002, pp. 226-236.
-
(2002)
ACM MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.L.2
-
4
-
-
0004118144
-
Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks
-
L. Buttyan and J. P. Hubaux, "Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks", Tech. Report EPFL, 2001.
-
(2001)
Tech. Report EPFL
-
-
Buttyan, L.1
Hubaux, J.P.2
-
5
-
-
84954161437
-
Enforcing service availability in mobile ad-hoc WANs
-
L. Buttyan and J. P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs", ACM Mobihoc 2000, pp. 87-96.
-
(2000)
ACM Mobihoc
, pp. 87-96
-
-
Buttyan, L.1
Hubaux, J.P.2
-
6
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad-hoc networks
-
462
-
L. Buttyan and J. P. Hubaux, "Stimulating cooperation in self-organizing mobile ad-hoc networks", ACM/Kluwer Mobile Networks and Applications, 8(5), pp. 579-592. 462
-
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.P.2
-
7
-
-
2442479712
-
IPass: An incentive compatible auction scheme to enable packet forwarding service in MANET
-
K. Chen and K. Nahrstedt, "iPass: An Incentive Compatible Auction Scheme to Enable Packet Forwarding Service in MANET", IEEE ICDCS 2004, pp. 534-542.
-
(2004)
IEEE ICDCS
, pp. 534-542
-
-
Chen, K.1
Nahrstedt, K.2
-
8
-
-
3042774583
-
Modelling incentives for collaboration in mobile ad hoc networks
-
J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, "Modelling incentives for collaboration in mobile ad hoc networks", Performance Evaluation, 57(4), pp. 427-439.
-
Performance Evaluation
, vol.57
, Issue.4
, pp. 427-439
-
-
Crowcroft, J.1
Gibbens, R.2
Kelly, F.3
Ostring, S.4
-
9
-
-
33645673382
-
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
-
M. Felegyhazi, J.-P. Hubaux and L. BuUyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks", IEEE Trans. on Mobile Computing, 5(5), pp. 463-476.
-
IEEE Trans. on Mobile Computing
, vol.5
, Issue.5
, pp. 463-476
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
BuUyan, L.3
-
10
-
-
30044448416
-
Hidden-action in multi-hop routing
-
DOI 10.1145/1064009.1064022, EC'05: Proceedings of the 6th ACM Conference on Electronic Commerce
-
M. Feldman, J. Chuang, I. Stoica and S. Shenker, "Hidden-action in multi-hop routing", ACM ECommerce 2005, pp. 117-126. (Pubitemid 43048671)
-
(2005)
Proceedings of the ACM Conference on Electronic Commerce
, pp. 117-126
-
-
Feldman, M.1
Chuang, J.2
Stoica, I.3
Shenker, S.4
-
11
-
-
37749013560
-
DARWIN: Distributed and adaptive reputation mechanism for wireless ad-hoc networks
-
J. J. Jaramillo and R. Srikant, "DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks", ACM MobiCom 2007, pp. 87-97.
-
(2007)
ACM MobiCom
, pp. 87-97
-
-
Jaramillo, J.J.1
Srikant, R.2
-
12
-
-
80051768284
-
Sustaining cooperation in multi-hop wireless networks
-
R. Mahajan, M. Rodrig, D. Wetherall and J. Zahorjan, "Sustaining cooperation in multi-hop wireless networks", NSDI 2005, pp. 231-244.
-
(2005)
NSDI
, pp. 231-244
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
14
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks", Communication and Multimedia Security Conference 2002, pp. 107-121.
-
(2002)
Communication and Multimedia Security Conference
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
15
-
-
12244292723
-
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
-
DOI 10.1016/j.adhoc.2004.07.006, PII S1570870504000575, Ad Hoc Networking for Pervasive Systems
-
P. Michiardi and R. Molva, "Analysis of coalition formation and cooperation strategies in mobile ad hoc networks", Ad Hoc Networks, 3(2005), pp. 193-219. (Pubitemid 40114350)
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.2
, pp. 193-219
-
-
Michiardi, P.1
Molva, R.2
-
16
-
-
4444276583
-
A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks
-
P. Michiardi and R. Molva, "A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks", WiOpt 2003.
-
(2003)
WiOpt
-
-
Michiardi, P.1
Molva, R.2
-
17
-
-
63449126936
-
Achieving cooperation in multihop wireless networks of selfish nodes
-
F. Milan, J. J. Jaramillo and R. Srikant, "Achieving cooperation in multihop wireless networks of selfish nodes", GameNets Workshop 2006.
-
(2006)
GameNets Workshop
-
-
Milan, F.1
Jaramillo, J.J.2
Srikant, R.3
-
19
-
-
33749513451
-
A reputation-based mechanism for isolating selfish nodes in ad hoc networks
-
DOI 10.1109/MOBIQUITOUS.2005.7, 1540982, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
M. T. Refaei, V. Srivastava, L. DaSilva and M. EItoweissy, "A reputation-based mechanism for isolating selfish nodes in ad hoc networks, Mobiquitous 2005, pp. 3-11. (Pubitemid 44523259)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 3-11
-
-
Refaei, M.T.1
Srivastava, V.2
DaSilva, L.3
Eltoweissy, M.4
-
20
-
-
0041939831
-
Cooperation in wireless ad hoc networks
-
V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, "Cooperation in wireless ad hoc networks", Proceedings of IEEE Infocom 2003, pp. 807-817.
-
(2003)
Proceedings of IEEE Infocom
, pp. 807-817
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.F.3
Rao, R.R.4
-
21
-
-
84869524908
-
-
J. Ratliff, http://www.virtualperfection.com/gametheory.
-
-
-
Ratliff, J.1
-
25
-
-
32144433522
-
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks - An integrated approach using game theoretical and cryptographic techniques
-
MobiCom 2005 - Proceedings of the Eleventh Annual International Conference on Mobile Computing and Networking
-
S. Zhong, L. Li, Y. Liu and Y. Yang, "On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks-An Integrated Approach Using Game Theoretical and Cryptographic Techniques", ACM Mobicom 2005, pp. 117-131. (Pubitemid 43206598)
-
(2005)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 117-131
-
-
Zhong, S.1
Li, L.2
Liu, Y.G.3
Yang, Y.R.4
-
26
-
-
37749014861
-
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
-
S. Zhong and F. Wu, "On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks", ACM MobiCom 2007, pp. 278-289.
-
(2007)
ACM MobiCom
, pp. 278-289
-
-
Zhong, S.1
Wu, F.2
|