Stimulating Participation in Wireless Community Networks
暂无分享,去创建一个
George C. Polyzos | Pantelis A. Frangoudis | Elias C. Efstathiou | E. C. Efstathiou | P. A. Frangoudis
[1] Leonidas J. Guibas,et al. A dichromatic framework for balanced trees , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).
[2] A. Goldberg,et al. A new approach to the maximum-flow problem , 1988, JACM.
[3] Andrew V. Goldberg,et al. On Implementing the Push—Relabel Method for the Maximum Flow Problem , 1997, Algorithmica.
[4] Alexander Aiken,et al. Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.
[5] Éva Tardos,et al. Simple Generalized Maximum Flow Algorithms , 1998, IPCO.
[6] M. Nowak,et al. Evolution of indirect reciprocity by image scoring , 1998, Nature.
[7] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.
[8] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[9] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[10] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[11] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[12] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[13] B. Greiner,et al. Indirect Reciprocity in Cyclical Networks - An Experimental Study - , 2005 .
[14] Hector Garcia-Molina,et al. PPay: micropayments for peer-to-peer systems , 2003, CCS '03.
[15] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[16] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[17] Brian D. Noble,et al. Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.
[18] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[19] R. Boyd,et al. Indirect reciprocity can stabilize cooperation without the second-order free rider problem , 2004, Nature.
[20] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[21] Jon Crowcroft,et al. Rethinking incentives for mobile ad hoc networks , 2004, PINS '04.
[22] Ratul Mahajan,et al. Experiences applying game theory to system design , 2004, PINS '04.
[23] Kostas G. Anagnostakis,et al. Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[24] George C. Polyzos,et al. A self-managed scheme for free citywide Wi-Fi , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[25] Markus Jakobsson,et al. Reputation-based Wi-Fi deployment , 2005, MOCO.
[26] Michal Feldman,et al. The evolution of cooperation under cheap pseudonyms , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[27] George C. Polyzos,et al. Self-organised peering of wireless LAN hotspots , 2005, Eur. Trans. Telecommun..
[28] Ratul Mahajan,et al. Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.
[29] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[30] Levente Buttyán,et al. Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[31] Sheng Zhong,et al. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks , 2006, Wirel. Networks.
[32] Kazumaro Aoki,et al. SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .