Indirect Reciprocity Game Modelling for Cooperation Stimulation in Cognitive Networks
暂无分享,去创建一个
K. J. Ray Liu | Yan Chen | Yan Chen | K. Liu | K. Liu
[1] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[3] Debao Xiao,et al. Understanding Peer Behavior and Designing Incentive Mechanism in Peer-to-Peer Networks: An Analytical Model Based on Game Theory , 2007, ICA3PP.
[4] Silvia Giordano,et al. Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .
[5] Pietro Michiardi,et al. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .
[6] K. J. Ray Liu,et al. Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[7] Allen B. MacKenzie,et al. Cognitive networks: adaptation and learning to achieve end-to-end performance objectives , 2006, IEEE Communications Magazine.
[8] R. A. Fisher,et al. The Genetical Theory of Natural Selection , 1931 .
[9] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[10] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[11] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[12] K. J. Ray Liu,et al. Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.
[13] Sheng Zhong,et al. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques , 2005, MobiCom '05.
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] K. J. Ray Liu,et al. Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks , 2009, IEEE Transactions on Multimedia.
[16] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[17] Levente Buttyán,et al. Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[18] Martin A. Nowak,et al. Indirect reciprocity provides a narrow margin of efficiency for costly punishment , 2008, Nature.
[19] Kevin Leyton-Brown,et al. Incentives for sharing in peer-to-peer networks , 2001, EC '01.
[20] John Maynard Smith. Evolution and the Theory of Games: Mixed strategies – II. Examples , 1982 .
[21] M. Nowak,et al. Evolution of indirect reciprocity , 2005, Nature.
[22] Emin Gün Sirer,et al. KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .
[23] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] Jon Crowcroft,et al. Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.
[25] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[26] Hector Garcia-Molina,et al. Limited reputation sharing in P2P systems , 2004, EC '04.
[27] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.