{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:59:33Z","timestamp":1758272373354},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,6,15]],"date-time":"2012-06-15T00:00:00Z","timestamp":1339718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s11277-012-0711-6","type":"journal-article","created":{"date-parts":[[2012,6,18]],"date-time":"2012-06-18T11:28:07Z","timestamp":1340018887000},"page":"617-640","source":"Crossref","is-referenced-by-count":14,"title":["Neighbor Selection Game in Wireless Ad Hoc Networks"],"prefix":"10.1007","volume":"70","author":[{"given":"Sajjad","family":"Zarifzadeh","sequence":"first","affiliation":[]},{"given":"Nasser","family":"Yazdani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,15]]},"reference":[{"key":"711_CR1","doi-asserted-by":"crossref","unstructured":"Ramanathan, R., & Rosales-Hain, R. (2000). Topology control of multihop wireless networks using transmit power adjustment. In Proceeding of IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2000.832213"},{"key":"711_CR2","doi-asserted-by":"crossref","unstructured":"Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. ACM Computing Surveys, 37(2).","DOI":"10.1145\/1089733.1089736"},{"key":"711_CR3","doi-asserted-by":"crossref","unstructured":"Lloyd, E. L., Liu, R., Marathe, M. V., Ramanathan, R., & Ravi, S. S. (2002). Algorithmic aspects of topology control problems for ad hoc networks. In Proceeding of ACM MobiHoc.","DOI":"10.1145\/513800.513816"},{"issue":"2","key":"711_CR4","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s11036-005-4468-y","volume":"11","author":"S. Eidenbenz","year":"2006","unstructured":"Eidenbenz S., Kumar V., Zust S. (2006) Equilibria in topology control games for ad hoc networks. ACM\/Kluwer Mobile Networks and Applications 11(2): 143\u2013159","journal-title":"ACM\/Kluwer Mobile Networks and Applications"},{"key":"711_CR5","doi-asserted-by":"crossref","unstructured":"Pham, P. P., & Perreau, S. (2003). Performance analysis of reactive shortest path and multi-path routing mechanism with load balance. In Proceeding of IEEE INFOCOM.","DOI":"10.26636\/jtit.2003.2.172"},{"key":"711_CR6","unstructured":"Ganjali, Y., & Keshavarzian, A. (2004). Load balancing in ad hoc networks: single-path routing vs. multi-path routing. In Proceeding of IEEE INFOCOM."},{"key":"711_CR7","doi-asserted-by":"crossref","unstructured":"Komali, R. S., MacKenzie, A. B., & Gilles, R. P. (2008). Effect of Selfish Node Behavior on Efficient Topology Design. IEEE Trans Mobile Computing, 7(9).","DOI":"10.1109\/TMC.2008.17"},{"issue":"4","key":"711_CR8","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TPDS.2006.53","volume":"17","author":"W. Song","year":"2006","unstructured":"Song W., Li X., Frieder O., Wang W. (2006) Localized topology control for unicast and broadcast in wireless ad hoc networks. IEEE\/ACM Trans Parallel and Distributed Systems 17(4): 321\u2013334","journal-title":"IEEE\/ACM Trans Parallel and Distributed Systems"},{"key":"711_CR9","doi-asserted-by":"crossref","unstructured":"Zarifzadeh, S., Nayyeri, A., & Yazdani, N. (2008). Efficient construction of network topology to conserve energy in wireless ad hoc networks. Elsevier Computer Communications, 31(1).","DOI":"10.1016\/j.comcom.2007.10.040"},{"key":"711_CR10","doi-asserted-by":"crossref","unstructured":"Zarifzadeh, S., Nayyeri, A., Yazdani, N., Khonsari, A., & Hajabdolali, H. (2009). Joint range assignment and routing to conserve energy in wireless ad hoc networks. Elsevier Computer Networks, 53(11).","DOI":"10.1016\/j.comnet.2009.02.010"},{"key":"711_CR11","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s11277-007-9432-7","volume":"44","author":"J. N. Al-Karaki","year":"2008","unstructured":"Al-Karaki J. N., Kamal A. E. (2008) Stimulating node cooperation in mobile ad hoc networks. Wireless Personal Communications 44: 219\u2013239","journal-title":"Wireless Personal Communications"},{"key":"711_CR12","doi-asserted-by":"crossref","unstructured":"Srivastava, V., Neel, J., MacKenzie, A., Menon, R., Hicks, J., DaSilva, L., Reed, J., & Gilles, R. (2005). Using Game Theory to Analyze Wireless Ad Hoc Networks. IEEE Comm Surveys and Tutorials, Fourth Quarter.","DOI":"10.1109\/COMST.2005.1593279"},{"key":"711_CR13","doi-asserted-by":"crossref","unstructured":"Komali, R. S., & MacKenzie, A. B. (2006). Distributed topology control in ad hoc networks: A game theoretic perspective. In Proceeding of IEEE CCNC.","DOI":"10.1109\/CCNC.2006.1593087"},{"issue":"4","key":"711_CR14","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1109\/TWC.2010.04.090400","volume":"9","author":"R. S. Komali","year":"2010","unstructured":"Komali R. S., Thomas R. W., DaSilva L. A., MacKenzie A. B. (2010) The price of ignorance: Distributed topology control in cognitive networks. IEEE Trans Wireless Communications 9(4): 1434\u20131445","journal-title":"IEEE Trans Wireless Communications"},{"key":"711_CR15","doi-asserted-by":"crossref","unstructured":"Zarifzadeh, S., Nayyeri, A., & Yazdani, N. (2012). Energy-efficient topology control in wireless ad hoc networks with selfish nodes. Elsevier Computer Networks, 56(2).","DOI":"10.1016\/j.comnet.2011.10.025"},{"key":"711_CR16","doi-asserted-by":"crossref","unstructured":"van den Berg, E., Fecko, M.A., Samtani, S., Lacatus, C., & Patel, M. (2010). Cognitive Topology Control based on Game Theory. In Proceeding of IEEE Milcom.","DOI":"10.1109\/MILCOM.2010.5679565"},{"issue":"4","key":"711_CR17","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1109\/TASE.2009.2021321","volume":"6","author":"H. Ren","year":"2009","unstructured":"Ren H., Meng M. Q. H. (2009) Game-theoritic modeling of joint topology control and power scheduling for wireless heterogeneous sensor networks. IEEE Trans Automation Science and Engineering 6(4): 610\u2013625","journal-title":"IEEE Trans Automation Science and Engineering"},{"key":"711_CR18","unstructured":"Hao, X. C., & Zhang, Y. X. (2012). Virtual game-based energy balanced topology control algorithm for wireless sensor networks. Wireless Personal Communications."},{"key":"711_CR19","unstructured":"Chu, X., & Sethu, H. (2012). Cooperative topology control with vdaptation for improved lifetime in wireless ad hoc networks. In Proceeding of IEEE INFOCOM."},{"key":"711_CR20","doi-asserted-by":"crossref","unstructured":"Yuen, S., & Li, B. (2005). Strategyproof mechanisms towards evolutionary topology formation in autonomous networks. ACM\/Kluwer Mobile Networks and Applications, special issue on non-cooperative. Wireless Networking and Computing.","DOI":"10.1007\/s11036-005-4452-6"},{"key":"711_CR21","unstructured":"Cai, J., Liu, Y., Lian, J., Li, M., Pooch, U. W., & Ni, L. M. (2006). Truthful topology control in wireless ad hoc networks with selfish nodes. In Proceeding of ICPP."},{"key":"711_CR22","doi-asserted-by":"crossref","unstructured":"Santi, P., Eidenbenz, S., & Resta, G. (2006). A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks. In Proceeding of DIWANS.","DOI":"10.1145\/1160972.1160976"},{"key":"711_CR23","volume-title":"Game theory","author":"D. Fudenberg","year":"1991","unstructured":"Fudenberg D., Tirole J. (1991) Game theory. MIT Press, Cambridge"},{"key":"711_CR24","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1006\/game.1996.0044","volume":"14","author":"D. Monderer","year":"1996","unstructured":"Monderer D., Shapley L. (1996) Potential games. Games and Economic Behavior 14: 124\u2013143","journal-title":"Games and Economic Behavior"},{"issue":"4","key":"711_CR25","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1023\/A:1016627727877","volume":"7","author":"C. E. Jones","year":"2001","unstructured":"Jones C. E., Sivalingam K. M., Agrawal P., Chen J. C. (2001) A survey of energy efficient network protocols for wireless networks. Wireless Networks 7(4): 343\u2013358","journal-title":"Wireless Networks"},{"key":"711_CR26","doi-asserted-by":"crossref","unstructured":"Komali, R. S., & MacKenzie, A. B. (2009). Analyzing selfish topology control in multi-radio multi-channel multi-hop wireless networks. In Proceeding of IEEE ICC.","DOI":"10.1109\/ICC.2009.5198750"},{"key":"711_CR27","doi-asserted-by":"crossref","unstructured":"Li, N., Hou, J. C., & Sha, L. (2003). Design and analysis of an MST-Based topology control algorithm. In Proceeding of IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2003.1209193"},{"key":"711_CR28","doi-asserted-by":"crossref","unstructured":"Muqattash, A., & Krunz, M. (2003). CDMA-based MAC protocol for wireless ad hoc networks. In Proceeding of ACM MobiHoc.","DOI":"10.1145\/778415.778434"},{"key":"711_CR29","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1007\/s11277-010-9967-x","volume":"60","author":"V. P. Singh","year":"2011","unstructured":"Singh V. P., Kumar K. (2011) Literature survey on power control algorithms for mobile ad-hoc network. Wireless Personal Communications 60: 679\u2013685","journal-title":"Wireless Personal Communications"},{"key":"711_CR30","doi-asserted-by":"crossref","unstructured":"Felegyhazi, M., Hubaux, J. P., & Buttyan, L. (2006). Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Trans Mobile Computing, 5(5).","DOI":"10.1109\/TMC.2006.68"},{"key":"711_CR31","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1002\/net.3230080402","volume":"8","author":"D. S. Johnson","year":"1978","unstructured":"Johnson D. S., Lenstra J. K., Rinnoy Kan A. H. G. (1978) The complexity of the network design problem. Networks 8: 279\u2013285","journal-title":"Networks"},{"key":"711_CR32","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1137\/0601008","volume":"1","author":"R.T. Wong","year":"1980","unstructured":"Wong R.T. (1980) Worst case analysis of network design problem heuristics. SIAM Journal of Algorithms on Discrete Mathematics. 1: 51\u201363","journal-title":"SIAM Journal of Algorithms on Discrete Mathematics."},{"key":"711_CR33","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0166-218X(00)00185-2","volume":"105","author":"B.Y. Wu","year":"2000","unstructured":"Wu B.Y., Chao K.M., Tang C.Y. (2000) Approximation algorithms for the shortest path total path length spanning tree problem. Elsevier Discrete Applied Mathematics 105: 273\u2013289","journal-title":"Elsevier Discrete Applied Mathematics"},{"key":"711_CR34","volume-title":"Introduction to algorithms","author":"T. H. Cormen","year":"1990","unstructured":"Cormen T. H., Leiserson C. E., Rivest R. L. (1990) Introduction to algorithms. MIT Press, Cambridge"},{"issue":"056113","key":"711_CR35","first-page":"1","volume":"71","author":"P. Mieghem","year":"2005","unstructured":"Mieghem P., Langen S. (2005) Influence of the link weight structure on the shortest path. Physical Review 71(056113): 1\u201313","journal-title":"Physical Review"},{"issue":"056138","key":"711_CR36","first-page":"2","volume":"72","author":"P. Mieghem","year":"2005","unstructured":"Mieghem P., Magdalena S. M. (2005) Phase transition in the link weight structure of networks. Physical Review 72(056138): 2\u20137","journal-title":"Physical Review"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0711-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0711-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0711-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T18:02:17Z","timestamp":1714068137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0711-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,15]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["711"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0711-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,15]]}}}