{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:30:56Z","timestamp":1778344256726,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662533536","type":"print"},{"value":"9783662533543","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53354-3_12","type":"book-chapter","created":{"date-parts":[[2016,9,3]],"date-time":"2016-09-03T18:43:34Z","timestamp":1472928214000},"page":"141-152","source":"Crossref","is-referenced-by-count":7,"title":["On Selfish Creation of Robust Networks"],"prefix":"10.1007","author":[{"given":"Ankit","family":"Chauhan","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Lenzner","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Melnichenko","sequence":"additional","affiliation":[]},{"given":"Martin","family":"M\u00fcnn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,1]]},"reference":[{"issue":"1","key":"12_CR1","first-page":"2","volume":"2","author":"S Albers","year":"2014","unstructured":"Albers, S., Eilts, S., Even-Dar, E., Mansour, Y., Roditty, L.: On nash equilibria for a network creation game. ACM TEAC 2(1), 2 (2014)","journal-title":"ACM TEAC"},{"issue":"2","key":"12_CR2","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1137\/090771478","volume":"27","author":"N Alon","year":"2013","unstructured":"Alon, N., Demaine, E.D., Hajiaghayi, M.T., Leighton, T.: Basic network creation games. SIAM J. Discrete Math. 27(2), 656\u2013668 (2013)","journal-title":"SIAM J. Discrete Math."},{"issue":"3","key":"12_CR3","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1007\/s00224-014-9582-4","volume":"57","author":"E Anshelevich","year":"2015","unstructured":"Anshelevich, E., Bhardwaj, O., Usher, M.: Friend of my friend: Network formation with two-hop benefit. Theor. Comput. Syst. 57(3), 711\u2013752 (2015)","journal-title":"Theor. Comput. Syst."},{"issue":"5","key":"12_CR4","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1111\/1468-0262.00155","volume":"68","author":"V Bala","year":"2000","unstructured":"Bala, V., Goyal, S.: A noncooperative model of network formation. Econometrica 68(5), 1181\u20131229 (2000)","journal-title":"Econometrica"},{"issue":"3","key":"12_CR5","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/2770639","volume":"3","author":"D Bil\u00f2","year":"2015","unstructured":"Bil\u00f2, D., Gual\u00e0, L., Proietti, G.: Bounded-distance network creation games. ACM Trans. Econ. Comput. 3(3), 16 (2015)","journal-title":"ACM Trans. Econ. Comput."},{"key":"12_CR6","unstructured":"Chauhan, A., Lenzner, P., Melnichenko, A., M\u00fcnn, M.: On selfish creation of robust networks. arXiv preprint (2016). arXiv:1607.02071"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Corbo, J., Parkes, D.: The price of selfish behavior in bilateral network formation. In: Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing, PODC 2005, pp. 99\u2013107. ACM, New York, NY, USA (2005)","DOI":"10.1145\/1073814.1073833"},{"issue":"2","key":"12_CR8","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2151171.2151176","volume":"8","author":"ED Demaine","year":"2012","unstructured":"Demaine, E.D., Hajiaghayi, M.T., Mahini, H., Zadimoghaddam, M.: The price of anarchy in network creation games. ACM Trans. Algorithms 8(2), 13 (2012)","journal-title":"ACM Trans. Algorithms"},{"issue":"4","key":"12_CR9","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/2701615","volume":"11","author":"S Ehsani","year":"2015","unstructured":"Ehsani, S., Fadaee, S.S., Fazli, M., Mehrabian, A., Sadeghabad, S.S., Safari, M.A., Saghafian, M.: A bounded budget network creation game. ACM Trans. Algorithms 11(4), 34 (2015)","journal-title":"ACM Trans. Algorithms"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C.H., Shenker, S.: On a network creation game. In: PODC 2003, pp. 347\u2013351. ACM, New York, USA (2003)","DOI":"10.1145\/872035.872088"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-3-642-31104-8_14","volume-title":"Structural Information and Communication Complexity","author":"M Flammini","year":"2012","unstructured":"Flammini, M., Gallotti, V., Melideo, G., Monaco, G., Moscardelli, L.: Mobile network creation games. In: Even, G., Halld\u00f3rsson, M.M. (eds.) SIROCCO 2012. LNCS, vol. 7355, pp. 159\u2013170. Springer, Heidelberg (2012)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Goyal, S., Jabbari, S., Kearns, M., Khanna, S., Morgenstern, J.: Strategic network formation with attack and immunization. arXiv preprint 2015. arXiv:1511.05196","DOI":"10.1007\/978-3-662-54110-4_30"},{"issue":"1","key":"12_CR13","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1006\/jeth.1996.0108","volume":"71","author":"MO Jackson","year":"1996","unstructured":"Jackson, M.O., Wolinsky, A.: A strategic model of social and economic networks. J. Econ. Theor. 71(1), 44\u201374 (1996)","journal-title":"J. Econ. Theor."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kawald, B., Lenzner, P.: On dynamics in selfish network creation. In: SPAA 2013, pp. 83\u201392. ACM, New York, NY, USA (2013)","DOI":"10.1145\/2486159.2486185"},{"issue":"3","key":"12_CR15","doi-asserted-by":"crossref","first-page":"302","DOI":"10.3390\/g2030302","volume":"2","author":"L Kliemann","year":"2011","unstructured":"Kliemann, L.: The price of anarchy for network formation in an adversary model. Games 2(3), 302\u2013332 (2011)","journal-title":"Games"},{"key":"12_CR16","unstructured":"Kliemann, L.: The price of anarchy in bilateral network formation in an adversary model. arXiv preprint (2013). arXiv:1308.1832"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/978-3-642-35311-6_11","volume-title":"Internet and Network Economics","author":"P Lenzner","year":"2012","unstructured":"Lenzner, P.: Greedy selfish network creation. In: Goldberg, P.W. (ed.) WINE 2012. LNCS, vol. 7695, pp. 142\u2013155. Springer, Heidelberg (2012)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Meirom, E.A., Mannor, S., Orda, A.: Network formation games with heterogeneous players and the internet structure. In: Proceedings of the 15th ACM Conference on Economics and Computation, pp. 735\u2013752. ACM (2014)","DOI":"10.1145\/2600057.2602862"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Meirom, E.A., Mannor, S., Orda, A.: Formation games of reliable networks. In: INFOCOM 2015, pp. 1760\u20131768. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218557"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1007\/978-3-642-16170-4_24","volume-title":"Algorithmic Game Theory","author":"M Mihal\u00e1k","year":"2010","unstructured":"Mihal\u00e1k, M., Schlegel, J.C.: The price of anarchy in network creation games Is (Mostly) constant. In: Kontogiannis, S., Koutsoupias, E., Spirakis, P.G. (eds.) SAGT 2010. LNCS, vol. 6386, pp. 276\u2013287. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Game Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53354-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T01:54:09Z","timestamp":1568339649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53354-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533536","9783662533543"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53354-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}