Backbone construction in selfish wireless networks
暂无分享,去创建一个
Seungjoon Lee | Vijay Gopalakrishnan | Bobby Bhattacharjee | Dave Levin | Dave Levin | V. Gopalakrishnan | Seungjoon Lee | Bobby Bhattacharjee
[1] Alec Wolman,et al. A multi-radio unification protocol for IEEE 802.11 wireless networks , 2004, First International Conference on Broadband Networks.
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[4] Alessandro Panconesi,et al. Localized protocols for ad hoc clustering and backbone formation: a performance comparison , 2006, IEEE Transactions on Parallel and Distributed Systems.
[5] A. Diekmann. Volunteer's Dilemma , 1985 .
[6] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[7] Jeroen Weesie,et al. Incomplete Information and Timing in the Volunteer's Dilemma , 1994 .
[8] Jie Wu,et al. An extended localized algorithm for connected dominating set formation in ad hoc wireless networks , 2004, IEEE Transactions on Parallel and Distributed Systems.
[9] Madhav V. Marathe,et al. The distance-2 matching problem and its relationship to the MAC-Layer capacity of ad hoc wireless networks , 2004, IEEE Journal on Selected Areas in Communications.
[10] Aravind Srinivasan,et al. Fast distributed algorithms for (weakly) connected dominating sets and linear-size skeletons , 2003, J. Comput. Syst. Sci..
[11] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[12] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2005, Wirel. Networks.
[13] Ratul Mahajan,et al. Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.
[14] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[15] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[16] Xiang-Yang Li,et al. Geometric spanners for wireless ad hoc networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[17] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] Jitendra Padhye,et al. Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.
[19] Dave Levin. Punishment in Selfish Wireless Networks : A Game Theoretic Analysis , 2006 .
[20] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[21] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[22] Samir Khuller,et al. Approximation Algorithms for Connected Dominating Sets , 1996, Algorithmica.
[23] B. Nalebuff,et al. Dragon-slaying and ballroom dancing: The private supply of a public good , 1984 .
[24] Sheng Zhong,et al. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques , 2005, MobiCom '05.
[25] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[26] Xiang-Yang Li,et al. Distributed low-cost backbone formation for wireless ad hoc networks , 2005, MobiHoc '05.
[27] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.