{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T02:09:19Z","timestamp":1649038159141},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T00:00:00Z","timestamp":1348185600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Dyn Games Appl"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s13235-012-0058-3","type":"journal-article","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T14:12:05Z","timestamp":1348150325000},"page":"38-67","source":"Crossref","is-referenced-by-count":1,"title":["Transforming Monitoring Structures with Resilient Encoders\u2014Application to Repeated Games"],"prefix":"10.1007","volume":"3","author":[{"given":"Ma\u00ebl","family":"Le Treust","sequence":"first","affiliation":[]},{"given":"Samson","family":"Lasaulce","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,21]]},"reference":[{"issue":"1","key":"58_CR1","first-page":"76","volume":"4","author":"R Ahlswede","year":"1979","unstructured":"Ahlswede R (1979) Coloring hypergraphs: a new approach to multi-user source coding, part 1. J Comb Inf Syst Sci 4(1):76\u2013115","journal-title":"J Comb Inf Syst Sci"},{"issue":"3","key":"58_CR2","first-page":"220","volume":"5","author":"R Ahlswede","year":"1980","unstructured":"Ahlswede R (1980) Coloring hypergraphs: a new approach to multi-user source coding, part 2. J Comb Inf Syst Sci 5(3):220\u2013268","journal-title":"J Comb Inf Syst Sci"},{"issue":"4","key":"58_CR3","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"key":"58_CR4","unstructured":"Aumann RJ (1981) Survey of repeated game, pp 11\u201342"},{"key":"58_CR5","first-page":"11","volume-title":"Essays in game theory and mathematical economics in honor of Oskar Morgenstern","author":"RJ Aumann","year":"1981","unstructured":"Aumann RJ (1981) Survey of repeated game. In: Essays in game theory and mathematical economics in honor of Oskar Morgenstern. Wissenschaftsverlag, Bibliographisches Institut, Mannheim, pp 11\u201342"},{"key":"58_CR6","unstructured":"Bavly G, Neyman A (2003) Online concealed correlation by boundedly rational players. Discussion paper series. The Center for the Study of Rationality, Hebrew University, Jerusalem"},{"key":"58_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-03521-2","volume-title":"Graph theory with applications","author":"J Bondy","year":"1976","unstructured":"Bondy J, Murty U (1976) Graph theory with applications. Elsevier Science, Amsterdam"},{"key":"58_CR8","volume-title":"Elements of information theory","author":"TM Cover","year":"2006","unstructured":"Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. Wiley-Interscience, New York","edition":"2"},{"key":"58_CR9","unstructured":"Csisz\u00e1r I, K\u00f6rner J (1981) Information theory: coding theorems for discrete memoryless systems"},{"key":"58_CR10","first-page":"1963","volume-title":"IEEE proc of the 53rd vehicular technology conference","author":"MJ DaSilva","year":"2011","unstructured":"DaSilva MJ, Taffin A, Lasaulce S, Buljore S (2011) Closed loop transmit diversity enhancements for UMTS narrowband and wideband TD-CDMA. In: IEEE proc of the 53rd vehicular technology conference, vol\u00a03, pp 1963\u20131967"},{"issue":"1","key":"58_CR11","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/TIT.1981.1056302","volume":"27","author":"AA Gamal El","year":"1981","unstructured":"El Gamal AA, van\u00a0der Meulen E (1981) A proof of Marton\u2019s coding theorem for the discrete memoryless broadcast channel. IEEE Trans Inf Theory 27(1):120\u2013122","journal-title":"IEEE Trans Inf Theory"},{"issue":"5","key":"58_CR12","doi-asserted-by":"crossref","first-page":"997","DOI":"10.2307\/2951505","volume":"62","author":"D Fudenberg","year":"1994","unstructured":"Fudenberg D, Levine D, Maskin E (1994) The folk theorem with imperfect public information. Econometrica 62(5):997\u20131039","journal-title":"Econometrica"},{"key":"58_CR13","volume-title":"IEEE international symposium on information theory","author":"RG Gallager","year":"1976","unstructured":"Gallager RG (1976) Source coding with side information and universal coding. In: IEEE international symposium on information theory, Renneby, Sweden"},{"issue":"2","key":"58_CR14","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1287\/moor.1060.0248","volume":"32","author":"O Gossner","year":"2007","unstructured":"Gossner O, Tomala T (2007) Secret correlation in repeated games with imperfect monitoring. Math Oper Res 32(2):413\u2013424","journal-title":"Math Oper Res"},{"issue":"6","key":"58_CR15","doi-asserted-by":"crossref","first-page":"1603","DOI":"10.1111\/j.1468-0262.2006.00720.x","volume":"74","author":"O Gossner","year":"2006","unstructured":"Gossner O, Hernandez P, Neyman A (2006) Optimal use of communication resources. Econometrica 74(6):1603\u20131636","journal-title":"Econometrica"},{"key":"58_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-12066-8","volume-title":"Information-spectrum methods in information theory","author":"TS Han","year":"2003","unstructured":"Han TS (2003) Information-spectrum methods in information theory. Springer, Berlin"},{"issue":"6","key":"58_CR17","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1111\/j.1468-0262.2006.00717.x","volume":"74","author":"J H\u00f6rner","year":"2006","unstructured":"H\u00f6rner J, Olszewski W (2006) The folk theorem for games with private almost-perfect monitoring. Econometrica 74(6):1499\u20131544","journal-title":"Econometrica"},{"key":"58_CR18","first-page":"245","volume-title":"IEEE proc of the global telecommunications conference","author":"F Kowalewski","year":"2000","unstructured":"Kowalewski F (2000) Joint predistortion and transmit diversity. In: IEEE proc of the global telecommunications conference, vol\u00a01, pp 245\u2013249"},{"key":"58_CR19","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/0022-0531(88)90153-6","volume":"46","author":"E Lehrer","year":"1988","unstructured":"Lehrer E (1988) Repeated games with stationary bounded recall strategies. J Econ Theory 46:130\u2013144","journal-title":"J Econ Theory"},{"issue":"4","key":"58_CR20","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/BF01766432","volume":"19","author":"E Lehrer","year":"1991","unstructured":"Lehrer E (1991) Internal correlation in repeated games. Int J Game Theory 19(4):431\u2013456","journal-title":"Int J Game Theory"},{"issue":"9","key":"58_CR21","doi-asserted-by":"crossref","first-page":"2860","DOI":"10.1109\/TWC.2010.072610.091472","volume":"9","author":"M LeTreust","year":"2010","unstructured":"LeTreust M, Lasaulce S (2010) A repeated game formulation of energy-efficient decentralized power control. IEEE Trans Wirel Commun 9(9):2860\u20132869","journal-title":"IEEE Trans Wirel Commun"},{"key":"58_CR22","volume-title":"ACM proc of the 4th international workshop on game theory in communication networks (GAMECOMM11)","author":"M LeTreust","year":"2011","unstructured":"LeTreust M, Lasaulce S (2011) The price of re-establishing almost perfect monitoring in games with arbitrary monitoring structures. In: ACM proc of the 4th international workshop on game theory in communication networks (GAMECOMM11), Cachan (Paris), France"},{"key":"58_CR23","volume-title":"IEEE proc of the international conference on network games, control and optimization (NETGCOOP11)","author":"M LeTreust","year":"2011","unstructured":"LeTreust M, Lasaulce S (2011) Resilient source coding. In: IEEE proc of the international conference on network games, control and optimization (NETGCOOP11), Paris, France"},{"key":"58_CR24","unstructured":"Peretz R (2011) Correlation through bounded recall strategies. Discussion paper series. The Center for the Study of Rationality, Hebrew University, Jerusalem"},{"key":"58_CR25","unstructured":"Peyton Y (2004) Strategic learning and its limits"},{"issue":"2","key":"58_CR26","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s13235-011-0018-3","volume":"1","author":"J Renault","year":"2011","unstructured":"Renault J, Tomala T (2011) General properties of long-run supergames. Dyn Games Appl 1(2):319\u2013350","journal-title":"Dyn Games Appl"},{"key":"58_CR27","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379\u2013423","journal-title":"Bell Syst Tech J"},{"key":"58_CR28","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/TIT.1956.1056798","volume":"2","author":"CE Shannon","year":"1956","unstructured":"Shannon CE (1956) The zero error capacity of a noisy channel. IRE Trans Inf Theory 2:8\u201319","journal-title":"IRE Trans Inf Theory"},{"key":"58_CR29","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","volume":"19","author":"D Slepian","year":"1973","unstructured":"Slepian D, Wolf JK (1973) Noiseless coding of correlated information sources. IEEE Trans Inf Theory 19:471\u2013480","journal-title":"IEEE Trans Inf Theory"},{"key":"58_CR30","volume-title":"Handbook of game theory with economic applications","author":"S Sorin","year":"1992","unstructured":"Sorin S (1992) Repeated games with complete information. In: Handbook of game theory with economic applications, vol\u00a01. Elsevier Science, Amsterdam"},{"issue":"5","key":"58_CR31","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1109\/TIT.1976.1055607","volume":"22","author":"H Witsenhausen","year":"1976","unstructured":"Witsenhausen H (1976) The zero-error side information problem and chromatic numbers (corresp). IEEE Trans Inf Theory 22(5):592\u2013593","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Dynamic Games and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-012-0058-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13235-012-0058-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-012-0058-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T15:14:47Z","timestamp":1559488487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13235-012-0058-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,21]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["58"],"URL":"https:\/\/doi.org\/10.1007\/s13235-012-0058-3","relation":{},"ISSN":["2153-0785","2153-0793"],"issn-type":[{"value":"2153-0785","type":"print"},{"value":"2153-0793","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,21]]}}}