{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:15:34Z","timestamp":1774368934364,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T00:00:00Z","timestamp":1426636800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s12083-015-0342-2","type":"journal-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T06:59:28Z","timestamp":1426575568000},"page":"692-711","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["An incentive game based evolutionary model for crowd sensing networks"],"prefix":"10.1007","volume":"9","author":[{"given":"Xiao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,18]]},"reference":[{"key":"342_CR1","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.jnca.2014.03.004","volume":"42","author":"J Sun","year":"2014","unstructured":"Sun J, Ma H (2014) Heterogeneous-belief based incentive schemes for crowd sensing in mobile social networks. J Netw Comput Appl 42:189\u2013196","journal-title":"J Netw Comput Appl"},{"key":"342_CR2","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.comnet.2014.02.011","volume":"64","author":"S Hoteit","year":"2014","unstructured":"Hoteit S, Secci S, Sobolevsky S et al (2014) Estimating human trajectories and hotspots through mobile phone data. Comput Netw 64:296\u2013307","journal-title":"Comput Netw"},{"issue":"10","key":"342_CR3","first-page":"2606","volume":"97","author":"D Mianxiong","year":"2014","unstructured":"Mianxiong D, Kimata T, Sugiura K et al (2014) Quality-of-Experience (QoE) in emerging mobile social networks[J]. IEICE Trans Inf Syst 97(10):2606\u20132612","journal-title":"IEICE Trans Inf Syst"},{"issue":"9","key":"342_CR4","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1016\/j.comcom.2011.08.008","volume":"35","author":"K Ota","year":"2012","unstructured":"Ota K, Dong M, Cheng Z et al (2012) ORACLE: Mobility control in wireless sensor and actor networks. Comput Commun 35(9):1029\u20131037","journal-title":"Comput Commun"},{"key":"342_CR5","doi-asserted-by":"crossref","unstructured":"Dong M, Ota K, Li X, et al (2011) HARVEST: A task-objective efficient data collection scheme in wireless sensor and actor networks. Communications and Mobile Computing (CMC), 2011 Third International Conference on. IEEE pp 485\u2013488","DOI":"10.1109\/CMC.2011.122"},{"key":"342_CR6","doi-asserted-by":"crossref","unstructured":"Thiagarajan A, Ravindranath L, LaCurts K, et al (2009) VTrack: Accurate, energy-aware road traffic delay estimation using mobile phones[C]. Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems. ACM pp 85\u201398","DOI":"10.1145\/1644038.1644048"},{"key":"342_CR7","doi-asserted-by":"crossref","unstructured":"Maisonneuve N, Stevens M, Niessen ME, et al (2009) NoiseTube: Measuring and mapping noise pollution with mobile phones[M]. Information Technologies in Environmental Engineering. Springer, Berlin Heidelberg pp 215\u2013228","DOI":"10.1007\/978-3-540-88351-7_16"},{"key":"342_CR8","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.comnet.2014.07.013","volume":"73","author":"CK Tham","year":"2014","unstructured":"Tham CK, Luo T (2014) Fairness and social welfare in service allocation schemes for participatory sensing. Comput Netw 73:58\u201371","journal-title":"Comput Netw"},{"issue":"3","key":"342_CR9","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TPDS.2013.94","volume":"25","author":"W Wu","year":"2014","unstructured":"Wu W, Ma RTB, Lui JCS (2014) Distributed caching via rewarding: An incentive scheme design in P2P-VoD Systems. IEEE Trans Parallel Distributed Systems 25(3):612\u2013621","journal-title":"IEEE Trans Parallel Distributed Systems"},{"issue":"3","key":"342_CR10","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/TNET.2013.2258173","volume":"22","author":"S Li","year":"2014","unstructured":"Li S, Huang J (2014) Price differentiation for communication networks. IEEE\/ACM Trans Networking 22(3):703\u2013716","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"4","key":"342_CR11","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1016\/j.pmcj.2012.07.011","volume":"9","author":"AK Chorppath","year":"2013","unstructured":"Chorppath AK, Alpcan T (2013) Trading privacy with incentives in mobile commerce: A game theoretic approach. Pervasive Mob Comput 9(4):598\u2013612","journal-title":"Pervasive Mob Comput"},{"key":"342_CR12","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.chaos.2013.07.004","volume":"56","author":"ZG Chen","year":"2013","unstructured":"Chen ZG, Wang T, Xiao DG et al (2013) Can remembering history from predecessor promote cooperation in the next generation? Chaos, Solitons Fractals 56:59\u201368","journal-title":"Chaos, Solitons Fractals"},{"key":"342_CR13","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.ins.2014.03.051","volume":"278","author":"G Jiang","year":"2014","unstructured":"Jiang G, Ma F, Shang J et al (2014) Evolution of knowledge sharing behavior in social commerce: An agent-based computational approach. Inf Sci 278:250\u2013266","journal-title":"Inf Sci"},{"key":"342_CR14","unstructured":"Robert Ad, William DH (1981) The evolution of cooperation. http:\/\/www.life.umd.edu\/faculty\/wilkinson\/BIOL608W\/Axelrod&Hamilton81.pdf"},{"key":"342_CR15","doi-asserted-by":"crossref","unstructured":"Robbins H (1985) Some aspects of the sequential design of experiments. Herbert Robbins Selected Papers. Springer, New York, pp 169\u2013177","DOI":"10.1007\/978-1-4612-5110-1_13"},{"issue":"6432","key":"342_CR16","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1038\/364056a0","volume":"364","author":"M Nowak","year":"1993","unstructured":"Nowak M, Sigmund K (1993) A strategy of win-stay, lose-shift that outperforms tit-for-tat in the Prisoner\u2019s Dilemma game. Nature 364(6432):56\u201358","journal-title":"Nature"},{"key":"342_CR17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1038\/246015a0","volume":"246","author":"JM Smith","year":"1973","unstructured":"Smith JM, Price GR (1973) The logic of animal conflict. Nature 246:15","journal-title":"Nature"},{"issue":"4","key":"342_CR18","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1093\/iwc\/iwu013","volume":"26","author":"I Ghergulescu","year":"2014","unstructured":"Ghergulescu I, Muntean CH (2014) A novel sensor-based methodology for learner\u2019s motivation analysis in game-based learning. Interact Comput 26(4):305\u2013320","journal-title":"Interact Comput"},{"key":"342_CR19","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.comcom.2014.05.001","volume":"49","author":"J Chen","year":"2014","unstructured":"Chen J, Kiremire AR, Brust MR et al (2014) Modeling online social network users\u2019 profile attribute disclosure behavior from a game theoretic perspective. Comput Commun 49:18\u201332","journal-title":"Comput Commun"},{"key":"342_CR20","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.jnca.2013.10.006","volume":"41","author":"TY Wu","year":"2014","unstructured":"Wu TY, Lee WT, Guizani N et al (2014) Incentive mechanism for P2P file sharing based on social network and game theory. J Netw Comput Appl 41:47\u201355","journal-title":"J Netw Comput Appl"},{"key":"342_CR21","doi-asserted-by":"crossref","unstructured":"Liu G, Ji S, Cai Z (2014) Strengthen nodal cooperation for data dissemination in mobile social networks. Pers Ubiquit Comput 1\u201315","DOI":"10.1007\/s00779-014-0791-2"},{"issue":"12","key":"342_CR22","first-page":"3042","volume":"21","author":"GUI Chun-Mei","year":"2010","unstructured":"Chun-Mei GUI, Qiang JIAN, Huai-Min WANG, Quan-Yuan WU (2010) Repeated game theory based penalty-incentive mechanism in internet-based virtual computing environment. J Softw 21(12):3042\u20133055","journal-title":"J Softw"},{"key":"342_CR23","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.knosys.2012.12.005","volume":"41","author":"F Liu","year":"2013","unstructured":"Liu F, Li X, Ding Y et al (2013) A social network-based trust-aware propagation model for P2P systems. Knowl-Based Syst 41:8\u201315","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"342_CR24","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/s12083-012-0153-7","volume":"7","author":"C Tian","year":"2014","unstructured":"Tian C, Yang B (2014) A DS evidence theory based fuzzy trust model in file-sharing P2P networks. Peer-to-Peer Netw Appl 7(4):332\u2013345","journal-title":"Peer-to-Peer Netw Appl"},{"key":"342_CR25","unstructured":"Chen BB, Chan MC (2010) Mobicent: A credit-based incentive system for disruption tolerant network. 2010 Proceedings IEEE INFOCOM pp 1\u20139"},{"key":"342_CR26","doi-asserted-by":"crossref","unstructured":"Ning T, Yang Z, Xie X, et al (2011) Incentive-aware data dissemination in delay-tolerant mobile networks. 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) pp 539\u2013547","DOI":"10.1109\/SAHCN.2011.5984940"},{"issue":"2","key":"342_CR27","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11590-011-0411-2","volume":"7","author":"Y Okaie","year":"2013","unstructured":"Okaie Y, Nakano T (2013) Resource pricing games on graphs: Existence of Nash equilibria. Optim Lett 7(2):231\u2013240","journal-title":"Optim Lett"},{"issue":"3","key":"342_CR28","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s12083-012-0130-1","volume":"7","author":"A Liu","year":"2014","unstructured":"Liu A, Zhang D, Zhang P et al (2014) On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability. Peer-to-Peer Netw Appls 7(3):255\u2013273","journal-title":"Peer-to-Peer Netw Appls"},{"key":"342_CR29","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2012.12.037","volume":"230","author":"A Liu","year":"2013","unstructured":"Liu A, Jin X, Cui G et al (2013) Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network. Inf Sci 230:197\u2013226","journal-title":"Inf Sci"},{"key":"342_CR30","doi-asserted-by":"crossref","unstructured":"Liu Y, Liu A, Chen Z (2014) Analysis and improvement of send-and-wait automatic repeat-reQuest protocols for wireless sensor networks. Wirel Pers Commun 1\u201337. doi: 10.1007\/s11277-014-2164-6","DOI":"10.1007\/s11277-014-2164-6"},{"issue":"1","key":"342_CR31","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIC.2009.17","volume":"13","author":"M Zaki","year":"2009","unstructured":"Zaki M, Athman B (2009) Reputation bootstrapping for trust establishment among web services. IEEE Internet Comput 13(1):40\u201347","journal-title":"IEEE Internet Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0342-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-015-0342-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0342-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T02:13:22Z","timestamp":1566440002000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-015-0342-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,18]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["342"],"URL":"https:\/\/doi.org\/10.1007\/s12083-015-0342-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,18]]}}}