{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:13:35Z","timestamp":1725686015977},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642355813"},{"type":"electronic","value":"9783642355820"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35582-0_2","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T22:24:03Z","timestamp":1354746243000},"page":"16-30","source":"Crossref","is-referenced-by-count":1,"title":["A Competitive Rate Allocation Game"],"prefix":"10.1007","author":[{"given":"Yanting","family":"Wu","sequence":"first","affiliation":[]},{"given":"George","family":"Rabanca","sequence":"additional","affiliation":[]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[]},{"given":"Amotz","family":"Bar-Noy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P. Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Machine Learning\u00a047, 235\u2013256 (2002)","journal-title":"Machine Learning"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"MacKenzii, A., DaSilva, L.: Game Theory for Wireless Engineers. Morgan and Claypool Publishers (2006)","DOI":"10.1007\/978-3-031-01672-1"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.cor.2004.06.005","volume":"33","author":"E. Altman","year":"2006","unstructured":"Altman, E., Boulogne, T., El-Azouzi, R., Jimenez, T., Wynter, L.: A survey on networking games in telecommunications. Computer and Operations Research\u00a033, 286\u2013311 (2006)","journal-title":"Computer and Operations Research"},{"issue":"5","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1109\/JSAC.2002.1007390","volume":"20","author":"W. Yu","year":"2002","unstructured":"Yu, W., Ginis, G., Cioffi, J.M.: Distributed Multiuser Power Control for Digital Subscriber Lines. IEEE Jour. on Selected Areas in Communications\u00a020(5), 1105\u20131115 (2002)","journal-title":"IEEE Jour. on Selected Areas in Communications"},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/JSAC.2012.120109","volume":"30","author":"P. Mertikopoulos","year":"2012","unstructured":"Mertikopoulos, P., Belmega, E.V., Moustakas, A.L., Lasaulce, S.: Distributed Learning Policies for Power Allocation in Multiple Access Channels. IEEE Journal on Selected Areas in Communications\u00a030(1), 96\u2013106 (2012)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"2_CR6","first-page":"484","volume":"50","author":"A. Laourine","year":"2010","unstructured":"Laourine, A., Tong, L.: Betting on Gilbert-Elliott Channels. IEEE Transactions on Wireless Communications\u00a050(3), 484\u2013494 (2010)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2_CR7","unstructured":"Wu, Y., Krishnamachari, B.: Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel. WiOpt (May 2012)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-16170-4_11","volume-title":"Algorithmic Game Theory","author":"C. Daskalakis","year":"2010","unstructured":"Daskalakis, C., Frongillo, R., Papadimitriou, C.H., Pierrakos, G., Valiant, G.: On Learning Algorithms for Nash Equilibria. In: Kontogiannis, S., Koutsoupias, E., Spirakis, P.G. (eds.) SAGT 2010. LNCS, vol.\u00a06386, pp. 114\u2013125. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35582-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T14:20:34Z","timestamp":1687875634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35582-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642355813","9783642355820"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35582-0_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}