{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T19:40:08Z","timestamp":1743968408831,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642318689"},{"type":"electronic","value":"9783642318696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31869-6_4","type":"book-chapter","created":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T11:29:19Z","timestamp":1344598159000},"page":"43-59","source":"Crossref","is-referenced-by-count":0,"title":["AMPLE: A Novel Incentive Approach to Adaptive-Width Channel Allocation in Multi-hop, Non-cooperative Wireless Networks"],"prefix":"10.1007","author":[{"given":"Chunyang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Second rep. and order and memorandum opinion and order, http:\/\/hraunfoss.fcc.gov\/edocs_public\/attachmatch\/FCC-08-260A1.pdf"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the Ninth International Conference on Mobile Computing and Networking (MobiCom), San Diego, CA (September 2003)","DOI":"10.1145\/938985.939011"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Ben Salem, N., Buttyan, L., Hubaux, J.P., Jakobsson, M.: A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. In: Proceedings of the Fourth ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Annapolis, MD (June 2003)","DOI":"10.1145\/778415.778418"},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G. Bianchi","year":"2000","unstructured":"Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications\u00a018(3), 535\u2013547 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4_CR5","unstructured":"\u010cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.-P.: On selfish behavior in CSMA\/CA networks. In: Proceedings of 24th Annual IEEE Conference on Computer Communications (INFOCOM), Miami, FL (April 2005)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Chandra, R., Mahajan, R., Moscibroda, T., Raghavendra, R., Bahl, P.: A case for adapting channel width in wireless networks. In: Proceedings of ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, USA (August 2008)","DOI":"10.1145\/1402958.1402975"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Deek, L.B., Zhou, X., Almeroth, K.C., Zheng, H.: To preempt or not: Tackling bid and time-based cheating in online spectrum auctions. In: INFOCOM, pp. 2219\u20132227 (2011)","DOI":"10.1109\/INFCOM.2011.5935036"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Eidenbenz, S., Resta, G., Santi, P.: Commit: A sender-centric truthful and energy-efficient routing protocol for ad hoc networks with selfish nodes. In: Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS), Denver, CO (April 2005)","DOI":"10.1109\/IPDPS.2005.142"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"F\u00e9legyh\u00e1zi, M., \u010cagalj, M., Bidokhti, S.S., Hubaux, J.-P.: Non-cooperative multi-radio channel allocation in wireless networks. In: Proceedings of 26th Annual IEEE Conference on Computer Communications (INFOCOM), Anchorage, AK (May 2007)","DOI":"10.1109\/INFCOM.2007.170"},{"key":"4_CR10","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press (1991)"},{"key":"4_CR11","unstructured":"Gummadi, R., Balakrishnan, H.: Wireless networks should spread spectrum based on demands. In: Proceedings of ACM Hotnets, Calgary, Canada (October 2008)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Halld\u00f3rsson, M.M., Halpern, J.Y., Li, L.E., Mirrokni, V.S.: On spectrum sharing games. In: Proceedings of the 23rd Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), St. John\u2019s, Canada (July 2004)","DOI":"10.1145\/1011767.1011783"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/3-540-47906-6_98","volume-title":"NETWORKING 2002. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"J. Konorski","year":"2002","unstructured":"Konorski, J.: Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. In: Gregori, E., Conti, M., Campbell, A.T., Omidyar, G., Zukerman, M. (eds.) NETWORKING 2002. LNCS, vol.\u00a02345, pp. 1141\u20131146. Springer, Heidelberg (2002)"},{"key":"4_CR14","unstructured":"MacKenzie, A.B., Wicker, S.B.: Stability of multipacket slotted Aloha with selfish users and perfect information"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Moscibroda, T., Chandra, R., Wu, Y., Sengupta, S., Bahl, P., Yuan, Y.: Load-aware spectrum distribution in wireless lans. In: Proceedings of the 16th International Conference on Network Protocols (ICNP) (October 2008)","DOI":"10.1109\/ICNP.2008.4697032"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Nie, N., Comaniciu, C.: Adaptive channel allocation spectrum etiquette for cognitive radio networks. In: Proceedings of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Baltimore Harbor, MD (November 2005)","DOI":"10.1109\/DYSPAN.2005.1542643"},{"key":"4_CR17","unstructured":"Osborne, M.J., Rubenstein, A.: A Course in Game Theory. MIT Press (1994)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Rahul, H., Edalat, F., Sodini, D.K.C.: Frequency-aware rate adaptation and mac protocols. In: Proceedings of The Fourteenth International Conference on Mobile Computing and Networking (MobiCom), San Francisco, CA (September 2009)","DOI":"10.1145\/1614320.1614342"},{"key":"4_CR19","unstructured":"Srinivasan, V., Nuggehalli, P., Chiasserini, C.-F., Rao, R.: Cooperation in wireless ad hoc networks"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Wang, W., Eidenbez, S., Wang, Y., Li, X.-Y.: Ours\u2013optimal unicast routing systems in non-cooperative wireless networks. In: Proceedings of The Twelfth International Conference on Mobile Computing and Networking (MobiCom), Los Angeles (September 2006)","DOI":"10.1145\/1161089.1161134"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Wang, W., Li, X.-Y., Wang, Y.: Truthful multicast in selfish wireless networks. In: Proceedings of the Tenth International Conference on Mobile Computing and Networking (MobiCom), Philadelphia, PA (September 2004)","DOI":"10.1145\/1023720.1023745"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Wu, F., Singh, N., Vaidya, N., Chen, G.: On adaptive-width channel allocation in non-cooperative, multi-radio wireless networks. In: Proceedings of 30th Annual IEEE Conference on Computer Communications (INFOCOM), Shanghai, China (April 2011)","DOI":"10.1109\/INFCOM.2011.5935114"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Wu, F., Vaidya, N.: Small: A strategy-proof mechanism for radio spectrum allocation. University of Illinois at Urbana-Champaign, Tech. Rep. (2010)","DOI":"10.1109\/INFCOM.2011.5935304"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Wu, F., Zhong, S., Qiao, C.: Globally optimal channel assignment for non-cooperative wireless networks. In: Proceedings of 27th Annual IEEE Conference on Computer Communications (INFOCOM), Phoenix, AZ (April 2008)","DOI":"10.1109\/INFOCOM.2008.214"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Xu, P., Xu, X., Tang, S., Li, X.-Y.: Truthful online spectrum allocation and auction in multi-channel wireless networks. In: INFOCOM, pp. 26\u201330 (2011)","DOI":"10.1109\/INFCOM.2011.5935100"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Zhong, S., Li, L.E., Liu, Y.G., Yang, Y.R.: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks\u2013an integrated approach using game theoretical and cryptographic techniques. In: Proceedings of The Eleventh International Conference on Mobile Computing and Networking (MobiCom), Cologne, Germany (September 2005)","DOI":"10.1145\/1080829.1080841"},{"key":"4_CR27","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite, a simple, cheat-proof, credit-based system for mobile ad-hoc networks"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Zhong, S., Wu, F.: On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In: Proceedings of The Thirteenth International Conference on Mobile Computing and Networking (MobiCom), Montreal, Canada (September 2007)","DOI":"10.1145\/1287853.1287887"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, X., Gandhi, S., Suri, S., Zheng, H.: ebay in the sky: Strategy-proof wireless spectrum auctions. In: Proceedings of The Fourteenth International Conference on Mobile Computing and Networking (MobiCom), San Francisco, CA (September 2008)","DOI":"10.1145\/1409944.1409947"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, X., Zheng, H.: Trust: A general framework for truthful double spectrum auctions. In: Proceedings of 28th Annual IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil (April 2009)","DOI":"10.1109\/INFCOM.2009.5062011"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31869-6_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T19:24:21Z","timestamp":1743967461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31869-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642318689","9783642318696"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31869-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}