{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:33:22Z","timestamp":1725514402900},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540725039"},{"type":"electronic","value":"9783540725046"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72504-6_33","type":"book-chapter","created":{"date-parts":[[2007,7,22]],"date-time":"2007-07-22T07:36:39Z","timestamp":1185089799000},"page":"362-373","source":"Crossref","is-referenced-by-count":0,"title":["Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network"],"prefix":"10.1007","author":[{"given":"Yufeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yoshiaki","family":"Hori","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-540-25840-7_10","volume-title":"Agents and Peer-to-Peer Computing","author":"P. Obreiter","year":"2004","unstructured":"Obreiter, P., Nimis, J.: A taxonomy of incentive patterns. In: Moro, G., Sartori, C., Singh, M.P. (eds.) AP2PC 2003. LNCS (LNAI), vol.\u00a02872, pp. 89\u2013100. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: Core: a COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. of the IFIP - Communications and Multimedia Security Conference (2002)","key":"33_CR2","DOI":"10.1007\/978-0-387-35612-9_9"},{"doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol: cooperation of nodes-fairness in distributed Ad-hoc networks. In: Proc. of IEEE\/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC) (2002)","key":"33_CR3","DOI":"10.1145\/513800.513828"},{"unstructured":"Yu, W., Liu, K.J.R.: Attack-resistant cooperation stimulation in autonomous Ad Hoc networks. IEEE Journal on Selected Areas in Communications: Autonomic Communication Systems (2005)","key":"33_CR4"},{"doi-asserted-by":"crossref","unstructured":"Hubaux, J., et al.: Toward self-organized mobile Ad hoc networks: the Terminodes project. IEEE Communication Magazine (Jan. 2001)","key":"33_CR5","DOI":"10.1109\/35.894385"},{"issue":"5","key":"33_CR6","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1023\/A:1025146013151","volume":"8","author":"L. Buttyan","year":"2003","unstructured":"Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad hoc network. Mobile Networks and Applications\u00a08(5), 579\u2013592 (2003)","journal-title":"Mobile Networks and Applications"},{"doi-asserted-by":"crossref","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile Ad-Hoc Networks. In: Proc. of IEEE INFOCOM (2003)","key":"33_CR7","DOI":"10.1109\/INFCOM.2003.1209220"},{"doi-asserted-by":"crossref","unstructured":"Srinivasan, V., et al.: Cooperation in wireless ad hoc networks. In: Proc. of IEEE INFOCOM (2003)","key":"33_CR8","DOI":"10.1109\/INFCOM.2003.1208918"},{"doi-asserted-by":"crossref","unstructured":"M\u00e1rk F\u00e9legyh\u00e1zi, Jean-Pierre Hubaux and Levente Butty\u00e1n, Nash equilibria of packet Forwarding Strategies in Wireless Ad Hoc Networks. To appear in IEEE Transactions On Mobile Computing (2006)","key":"33_CR9","DOI":"10.1109\/TMC.2006.68"},{"doi-asserted-by":"crossref","unstructured":"Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile Ad hoc networks with selfish agents. In: Proc. of ACM MobiCom\u201903, pp. 245\u2013259 (2003)","key":"33_CR10","DOI":"10.1145\/938985.939011"},{"doi-asserted-by":"crossref","unstructured":"Eidenbenz, S., Resta, G., Santi, P.: COMMIT: A Sender-Centric Truthful and Energy-efficient routing protocol for Ad Hoc networks with selfish nodes. In: Proc. IEEE Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN) (2005)","key":"33_CR11","DOI":"10.1109\/IPDPS.2005.142"},{"doi-asserted-by":"crossref","unstructured":"Zhong, S., et al.: On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks\u2014 An Integrated Approach Using Game Theoretical and Cryptographic Techniques. In: Proc. of MobiCom (2005)","key":"33_CR12","DOI":"10.1145\/1080829.1080841"},{"unstructured":"Bauer, S.J., Faratin, P., Beverly, R.: Assessing the assumptions underlying mechanism design for the Internet. In: Proc. of the First Workshop on the Economics of Networked Systems (NetEcon) (2006)","key":"33_CR13"},{"doi-asserted-by":"crossref","unstructured":"Afergan, M.: Using repeated games to design incentive-based routing systems. In: Proc. of IEEE INFOCOM (2006)","key":"33_CR14","DOI":"10.1109\/INFOCOM.2006.61"},{"doi-asserted-by":"crossref","unstructured":"Nisan, N., Ronen, A.: Algorithmic mechanism design. Games and Economic Behavior\u00a011(2) (2001)","key":"33_CR15","DOI":"10.1006\/game.1999.0790"},{"unstructured":"Wang, Y.-f., et al.: Study on cooperation incentive mechanism based on Vickrey auction in Ad hoc networks. Journal of Beijing University of Posts and Telecommunications (BUPT)\u00a028(4) (2005)","key":"33_CR16"},{"doi-asserted-by":"crossref","unstructured":"Feldman, M., et al.: Hidden-action in multi-hop routing. In: Proc. of the 6th ACM Conference on Electronic Commerce (EC) (2005)","key":"33_CR17","DOI":"10.1145\/1064009.1064022"},{"unstructured":"Wang, Y., Hori, Y., Sakurai, K.: On incentive-compatible mechanisms in open networks. Technical Report, Kyushu University (2006)","key":"33_CR18"},{"unstructured":"Michiardi, P.: A survey of computational economics applied to computer networks, Research Report - Institut Eurecom, RR-06-173 (Aug. 2006)","key":"33_CR19"}],"container-title":["Lecture Notes in Computer Science","Theory and Applications of Models of Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72504-6_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:38:12Z","timestamp":1619501892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72504-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540725039","9783540725046"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72504-6_33","relation":{},"subject":[]}}