Frugal Routing on Wireless Ad-Hoc Networks
暂无分享,去创建一个
Rupak Majumdar | Adam Meyerson | Gunes Ercal | Rafit Izhak-Ratzin | A. Meyerson | Gunes Ercal | R. Majumdar | Rafit Izhak-Ratzin
[1] Rajeev Motwani,et al. Randomized Algorithms , 1995, SIGA.
[2] Noam Nisan,et al. Computationally feasible VCG mechanisms , 2000, EC '00.
[3] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[4] Christos H. Papadimitriou,et al. Algorithms, Games, and the Internet , 2001, ICALP.
[5] Maria J. Serna,et al. Faulty Random Geometric Networks , 2000, Parallel Process. Lett..
[6] Cecilia Mascolo,et al. An ad hoc mobility model founded on social network theory , 2004, MSWiM '04.
[7] Stefan Schulz,et al. Towards Trust-based Knowledge Management for Mobile Communities , 2003 .
[8] Éva Tardos,et al. Frugal path mechanisms , 2002, SODA '02.
[9] Junde Song,et al. Strategy proof trust management in wireless ad hoc network , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[10] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[11] Noam Nisan,et al. Algorithmic Mechanism Design , 2001, Games Econ. Behav..
[12] Mathew D. Penrose,et al. Random Geometric Graphs , 2003 .
[13] Jozef Gruska,et al. Mathematical Foundations of Computer Science 1998 , 1998, Lecture Notes in Computer Science.
[14] Chen Avin,et al. On the Cover Time of Random Geometric Graphs , 2005, ICALP.
[15] Robert D. Carr,et al. On the red-blue set cover problem , 2000, SODA '00.
[16] Xiang-Yang Li,et al. OURS: optimal unicast routing systems in non-cooperative wireless networks , 2006, MobiCom '06.
[17] Nicole Immorlica,et al. First-price path auctions , 2005, EC '05.
[18] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[19] David M. Kreps,et al. A Course in Microeconomic Theory , 2020 .
[20] E. H. Clarke. Multipart pricing of public goods , 1971 .
[21] Theodore Groves,et al. Incentives in Teams , 1973 .
[22] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[23] Gerd Kortuem,et al. Wearable Communities: Augmenting Social Networks with Wearable Computers , 2003, IEEE Pervasive Comput..
[24] Jason P. Jue,et al. Dynamic lightpath protection in WDM mesh networks under wavelength-continuity and risk-disjoint constraints , 2005, Comput. Networks.
[25] Bhaskar Krishnamachari,et al. Monotone properties of random geometric graphs have sharp thresholds , 2003, math/0310232.
[26] Anna R. Karlin,et al. Beyond VCG: frugality of truthful mechanisms , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[27] Kenneth Steiglitz,et al. Frugality in path auctions , 2004, SODA '04.
[28] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[29] Kunal Talwar,et al. The Price of Truth: Frugality in Truthful Mechanisms , 2003, STACS.
[30] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[31] Irit Dinur,et al. On the hardness of approximating label-cover , 2004, Inf. Process. Lett..
[32] R. Sami,et al. Path Auction Games When an Agent Can Own Multiple Edges ∗ , 2006 .
[33] Michael Alekhnovich,et al. Minimum propositional proof length is NP-hard to linearly approximate , 1998, Journal of Symbolic Logic.
[34] Sheng Zhong,et al. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques , 2005, MobiCom '05.