Study of Co-Operation among Selfish Neighbors in MANET under Evolutionary Game Theoretic Model
暂无分享,去创建一个
[1] David J. Goodman,et al. Network Assisted Power Control for Wireless Data , 2001, Mob. Networks Appl..
[2] Silvia Giordano,et al. Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .
[3] Ariel Orda,et al. Architecting noncooperative networks , 1995, Eighteenth Convention of Electrical and Electronics Engineers in Israel.
[4] Ariel Orda,et al. Incentive compatible pricing strategies for QoS routing , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] Eric van Damme,et al. Non-Cooperative Games , 2000 .
[7] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[8] K. Komathy,et al. A Corrective Approach to Alleviate the Sellishness of Mobile Nodes Indulging in Packet Drop , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.
[9] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[10] George Kesidis,et al. Nash equilibria of a generic networking game with applications to circuit-switched networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Peter Marbach,et al. Bandwidth Allocation in Wireless Ad Hoc Networks: A Price-Based Approach. , 2003, INFOCOM 2003.
[13] Robert Axelrod,et al. The Evolution of Strategies in the Iterated Prisoner's Dilemma , 2001 .
[14] R. Axelrod,et al. The Further Evolution of Cooperation , 1988, Science.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Pietro Michiardi,et al. Game theoretic analysis of security in mobile ad hoc networks , 2002 .
[17] Eitan Altman,et al. CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.
[18] Hisao Ishibuchi,et al. Evolution of cooperative behavior in the iterated prisoner's dilemma under random pairing in game playing , 2005, 2005 IEEE Congress on Evolutionary Computation.
[19] S. Fischer. Selfish Routing , 2002 .
[20] Tim Roughgarden,et al. How bad is selfish routing? , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[21] Ness B. Shroff,et al. A utility-based power-control scheme in wireless cellular systems , 2003, TNET.
[22] Catherine Rosenberg,et al. A game theoretic framework for bandwidth allocation and pricing in broadband networks , 2000, TNET.
[23] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[24] Tim Roughgarden,et al. Selfish Routing , 2002 .
[25] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.