{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T05:17:24Z","timestamp":1739251044808,"version":"3.37.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/gamenets.2009.5137390","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T15:05:14Z","timestamp":1246460714000},"page":"100-106","source":"Crossref","is-referenced-by-count":1,"title":["Systems-compatible incentives"],"prefix":"10.1109","author":[{"given":"Dave","family":"Levin","sequence":"first","affiliation":[]},{"given":"Neil","family":"Spring","sequence":"additional","affiliation":[]},{"given":"Bobby","family":"Bhattacharjee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"36","article-title":"free riding in bittorrent is cheap","author":"locher","year":"2006","journal-title":"Proc Workshop on Hot Topics in Networks (HotNets)"},{"key":"33","article-title":"boycotting and extorting nodes in an internetwork","author":"levin","year":"2007","journal-title":"Proc Joint Workshop on the Economics of Networked Systems and Incentive-Based Computing (NetEcon+IBC)"},{"key":"34","article-title":"bar gossip","author":"li","year":"2006","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"37","article-title":"symbiotic relationships in internet routing overlays","author":"lumezanu","year":"2009","journal-title":"Proc of Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"38","article-title":"peerwise discovery and negotiation of faster paths","author":"lumezanu","year":"2007","journal-title":"Proc Workshop on Hot Topics in Networks (HotNets)"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060319"},{"key":"42","article-title":"one hop reputations for peer to peer file sharing workloads","author":"piatek","year":"2008","journal-title":"Proc of Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"41","article-title":"do incentives build robustness in bittorrent?","author":"piatek","year":"2007","journal-title":"Proc of Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374390"},{"key":"24","article-title":"nysiad: practical protocol transformation to tolerate byzantine failures","author":"ho","year":"2008","journal-title":"Proc of Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2005.31"},{"year":"0","key":"26"},{"year":"0","key":"27"},{"key":"28","doi-asserted-by":"crossref","first-page":"169","DOI":"10.3233\/MGS-2005-1303","article-title":"tycoon: an implemention of a distributed market-based resource allocation system","volume":"1","author":"lai","year":"2005","journal-title":"Multiagent and Grid Systems"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254896"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.61"},{"key":"2","article-title":"pricing multicasting in more practical network models","author":"adler","year":"2002","journal-title":"Proc ACM-SIAM Symposium on Discrete Algorithms (SODA)"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"free riding on gnutella","volume":"5","author":"adar","year":"2000","journal-title":"First Monday"},{"journal-title":"BitTorrent","year":"0","key":"7"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(85)90102-4"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080198"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1403027.1403048"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"31","article-title":"punishment in selfish wireless networks: a game theoretic analysis","author":"levin","year":"2006","journal-title":"Proc Workshop on the Economics of Networked Systems (NetEcon)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080202"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1145\/1080829.1080854","article-title":"mob: a mobile bazaar for wide-area wireless services","author":"chakravorty","year":"2005","journal-title":"Mobicom"},{"journal-title":"Gnutella","year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/571855.571856"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1007\/11496137_25","article-title":"off-line karma: a decentralized currency for peer-to-peer and grid applications","author":"garcia","year":"2005","journal-title":"Applied Cryptography and Network Security Conference (ACNS)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282395"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_3"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945458"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"the sybil attack","author":"douceur","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/BF01726210"},{"key":"12","article-title":"incentives build robustness in bittorrent","author":"cohen","year":"2003","journal-title":"Proc Workshop on Economics of Peer-to-Peer Systems (P2PEcon)"},{"key":"21","article-title":"improving the reliability of internet paths with one-hop source routing","author":"gummadi","year":"2004","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.2307\/1914085"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1177\/0022002794038003008"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.2307\/2977633"},{"key":"44","article-title":"free-riding in bittorrent networks with the large view exploit","author":"sirivianos","year":"2007","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"47","article-title":"experience with an object reputation system for peer-to-peer filesharing","author":"walsh","year":"2006","journal-title":"Proc of Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"46","article-title":"karma: a secure economic framework for p2p resource sharing","author":"vishnumurthy","year":"2003","journal-title":"Proc Workshop on Economics of Peer-to-Peer Systems (P2PEcon)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850224"}],"event":{"name":"2009 International Conference on Game Theory for Networks (GameNets)","start":{"date-parts":[[2009,5,13]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2009,5,15]]}},"container-title":["2009 International Conference on Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076471\/5137364\/05137390.pdf?arnumber=5137390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T15:40:57Z","timestamp":1739202057000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5137390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/gamenets.2009.5137390","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}