메뉴 건너뛰기




Volumn 9, Issue 8, 2010, Pages 1147-1160

Controlled Wi-Fi sharing in cities: A decentralized approach relying on indirect reciprocity

Author keywords

Community networks; Cooperation; Decentralization; Indirect reciprocity; Wi Fi; Wi Fi telephony

Indexed keywords

BROADBAND COMMUNICATION; COMMUNITY NETWORKS; COOPERATION; DECENTRALIZED APPROACH; DECENTRALIZED ARCHITECTURE; DUAL MODES; FREE-RIDERS; MOBILE USERS; PUBLIC-PRIVATE; WI FI NETWORKS; WI-FI SERVICE;

EID: 77953776916     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.79     Document Type: Article
Times cited : (24)

References (39)
  • 1
    • 77953737891 scopus 로고    scopus 로고
    • Linksys, http://www.linksysbycisco.com, 2010.
    • Linksys , vol.2010
  • 2
    • 77953743872 scopus 로고    scopus 로고
    • Openswan, http://www.openswan.org, 2010.
    • (2010) Openswan
  • 3
    • 77953797321 scopus 로고    scopus 로고
    • P2PWNC Project Website
    • P2PWNC Project Website, http://mm.aueb.gr/research/p2pwnc, 2010
    • (2010)
  • 4
    • 77953803651 scopus 로고    scopus 로고
    • SpeakeasyNetShareService
    • SpeakeasyNetShareService,http://www.speakeasy.net/netshare, 2010.
    • (2010)
  • 6
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan.-Mar.
    • S. Capkun, L. Buttyan, and J.P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.2, no.1, pp. 52-64, Jan.-Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 7
    • 77953742183 scopus 로고
    • The evolution of cooperation
    • first published by Basic Books, 1984
    • R. Axelrod, The Evolution of Cooperation. Penguin Books, 1990 (first published by Basic Books, 1984).
    • (1990) Penguin Books
    • Axelrod, R.1
  • 8
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic Ad-Hoc networks)
    • S. Buchegger and J.Y.L. Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-Hoc Networks)," Proc. ACM MobiHoc, 2002.
    • (2002) Proc. ACM MobiHoc
    • Buchegger, S.1    Boudec, J.Y.L.2
  • 9
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • L. Buttyan and J.P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM/Kluwer Mobile Networks and Applications, vol.8, no.5, pp. 579-592, 2003.
    • (2003) ACM/Kluwer Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.P.2
  • 11
    • 0000122499 scopus 로고    scopus 로고
    • On implementing the push-relabel method for the maximum flow problem
    • B.V. Cherkassky and A.V. Goldberg, "On Implementing the Push-Relabel Method for the Maximum Flow Problem," Algorithmica, vol.19, no.4, pp. 390-1310, 1997.
    • (1997) Algorithmica , vol.19 , Issue.4 , pp. 390-1310
    • Cherkassky, B.V.1    Goldberg, A.V.2
  • 12
    • 0003319320 scopus 로고    scopus 로고
    • Voice over IP performance monitoring
    • R.G. Cole and J.H. Rosenbluth, "Voice over IP Performance Monitoring," ACM Computer Comm. Rev., vol.31, no.2, pp. 9-24, 2001.
    • (2001) ACM Computer Comm. Rev. , vol.31 , Issue.2 , pp. 9-24
    • Cole, R.G.1    Rosenbluth, J.H.2
  • 17
    • 26844521290 scopus 로고    scopus 로고
    • Self-organized peering of wireless LAN hotspots
    • Telecomm., special issue on self-organization in mobile networking
    • E.C. Efstathiou and G.C. Polyzos, "Self-Organized Peering of Wireless LAN Hotspots," European Trans. Telecomm., special issue on self-organization in mobile networking, vol.16, no.5, 2005.
    • (2005) European Trans. , vol.16 , Issue.5
    • Efstathiou, E.C.1    Polyzos, G.C.2
  • 18
    • 77953738927 scopus 로고    scopus 로고
    • Electronic Frontier Foundation (EFF) Wireless Friendly ISP List
    • Electronic Frontier Foundation (EFF), "Wireless Friendly ISP List," http://www.eff.org/Infrastructure/Wireless-cellular-radio/wireless- friendly-isp-list.html, 2009.
    • (2009)
  • 21
    • 33645673382 scopus 로고    scopus 로고
    • Nash equilibria of packet forwarding strategies in wireless ad hoc networks
    • May
    • M. Felegyhazi, J.P. Hubaux, and L. Buttyan, "Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.5, no.5, pp. 463-476, May 2006.
    • (2006) IEEE Trans. Mobile Computing , vol.5 , Issue.5 , pp. 463-476
    • Felegyhazi, M.1    Hubaux, J.P.2    Buttyan, L.3
  • 23
  • 25
    • 0024090156 scopus 로고    scopus 로고
    • A new approach to the maximum-flow problem
    • A.V. Goldberg and R.E. Tarjan, "A New Approach to the Maximum-Flow Problem," J. ACM, vol.35, no.4, pp. 921-940, 1998.
    • (1998) J. ACM , vol.35 , Issue.4 , pp. 921-940
    • Goldberg, A.V.1    Tarjan, R.E.2
  • 26
    • 27644478825 scopus 로고    scopus 로고
    • Indirect reciprocity in cyclical networks\an experimental study
    • Max Planck Inst. of Economics, Strategic Interaction Group
    • B. Greiner and M.V. Levati, "Indirect Reciprocity in Cyclical Networks\An Experimental Study," Discussion Papers on Strategic Interaction 2003-2015, Max Planck Inst. of Economics, Strategic Interaction Group, http://ideas.repec.org/p/esi/discus/2003-15.html, 2003.
    • (2003) Discussion Papers on Strategic Interaction , pp. 2003-2015
    • Greiner, B.1    Levati, M.V.2
  • 27
    • 0003315821 scopus 로고    scopus 로고
    • IP encapsulating security payload (ESP)
    • S. Kent and R. Atkinson, "IP Encapsulating Security Payload (ESP)," IETF RFC 2406, 1998.
    • (1998) IETF RFC , vol.2406
    • Kent, S.1    Atkinson, R.2
  • 29
    • 85084162792 scopus 로고    scopus 로고
    • Attack-resistant trust metrics for public key certification
    • R. Levien and A. Aiken, "Attack-Resistant Trust Metrics for Public Key Certification," Proc. USENIX Security Symp., 1998.
    • (1998) Proc. USENIX Security Symp.
    • Levien, R.1    Aiken, A.2
  • 32
    • 0032507958 scopus 로고    scopus 로고
    • Evolution of indirect reciprocity by image scoring
    • M.A. Nowak and K. Sigmund, "Evolution of Indirect Reciprocity by Image Scoring," Nature, vol.393, pp. 573-577, 1998.
    • (1998) Nature , vol.393 , pp. 573-577
    • Nowak, M.A.1    Sigmund, K.2
  • 39
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile Ad-Hoc networks
    • S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.