{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T13:55:06Z","timestamp":1649166906498},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,8,3]],"date-time":"2012-08-03T00:00:00Z","timestamp":1343952000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithmica"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s00453-012-9675-x","type":"journal-article","created":{"date-parts":[[2012,8,2]],"date-time":"2012-08-02T16:53:14Z","timestamp":1343926394000},"page":"358-389","source":"Crossref","is-referenced-by-count":1,"title":["Emergency Connectivity in Ad-hoc Networks with Selfish Nodes"],"prefix":"10.1007","volume":"68","author":[{"given":"George","family":"Karakostas","sequence":"first","affiliation":[]},{"given":"Euripides","family":"Markou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,3]]},"reference":[{"key":"9675_CR1","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1145\/513800.513828","volume-title":"Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing","author":"S. Buchegger","year":"2002","unstructured":"Buchegger, S., Le\u00a0Boudec, J.-Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, New York, USA, pp. 226\u2013236 (2002). doi: 10.1145\/513800.513828"},{"issue":"5","key":"9675_CR2","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1023\/A:1025146013151","volume":"8","author":"L. Butty\u00e1n","year":"2003","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579\u2013592 (2003)","journal-title":"Mob. Netw. Appl."},{"issue":"1","key":"9675_CR3","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/TMC.2007.1069","volume":"7","author":"S. Eidenbenz","year":"2008","unstructured":"Eidenbenz, S., Resta, G., Santi, P.: The commit protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes. IEEE Trans. Mob. Comput. 7(1), 19\u201333 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"9675_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97881-4","volume-title":"Geometric Algorithms and Combinatorial Optimization","author":"M. Gr\u00f6tschel","year":"1988","unstructured":"Gr\u00f6tschel, M., Lov\u00e1sz, L., Schrijver, A.: Geometric Algorithms and Combinatorial Optimization. Springer, Berlin (1988)"},{"key":"9675_CR5","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1126\/science.162.3859.1243","volume":"162","author":"G. Hardin","year":"1968","unstructured":"Hardin, G.: The tragedy of the commons. Science 162, 1243\u20131248 (1968)","journal-title":"Science"},{"issue":"3","key":"9675_CR6","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1002\/wcm.399","volume":"6","author":"Q. He","year":"2006","unstructured":"He, Q., Wu, D., Khosla, P.: A secure incentive architecture for ad hoc networks: Research articles. Wirel. Commun. Mob. Comput. 6(3), 333\u2013346 (2006). doi: 10.1002\/wcm.v6:3","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"9675_CR7","first-page":"231","volume-title":"Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation","author":"R. Mahajan","year":"2005","unstructured":"Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Sustaining cooperation in multi-hop wireless networks. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, Berkeley, CA, USA, pp. 231\u2013244 (2005). http:\/\/dl.acm.org\/citation.cfm?id=1251203.1251220"},{"key":"9675_CR8","volume-title":"Proceedings of the 2006 Workshop on Game Theory for Communications and Networks","author":"F. Milan","year":"2006","unstructured":"Milan, F., Jaramillo, J.J., Srikant, R.: Achieving cooperation in multihop wireless networks of selfish nodes. In: Proceedings of the 2006 Workshop on Game Theory for Communications and Networks, New York, USA (2006). doi: 10.1145\/1190195.1190197"},{"key":"9675_CR9","first-page":"808","volume-title":"Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications","author":"V. Srinivasan","year":"2003","unstructured":"Srinivasan, V., Nuggehalli, P., Chiasserini, C.-F., Rao, R.: Cooperation in wireless ad-hoc networks. In: Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications, pp. 808\u2013817 (2003)"},{"key":"9675_CR10","first-page":"1987","volume-title":"Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications","author":"S. Zhong","year":"2003","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications, pp. 1987\u20131997 (2003)"},{"issue":"6","key":"9675_CR11","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1007\/s11276-006-9855-1","volume":"13","author":"S. Zhong","year":"2007","unstructured":"Zhong, S., Li, L., Liu, Y., Yang, Y.: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. Wirel. Netw. 13(6), 799\u2013816 (2007)","journal-title":"Wirel. Netw."}],"container-title":["Algorithmica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-012-9675-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00453-012-9675-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-012-9675-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T13:45:10Z","timestamp":1559137510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00453-012-9675-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,3]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["9675"],"URL":"https:\/\/doi.org\/10.1007\/s00453-012-9675-x","relation":{},"ISSN":["0178-4617","1432-0541"],"issn-type":[{"value":"0178-4617","type":"print"},{"value":"1432-0541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,3]]}}}