{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:15:33Z","timestamp":1729678533152,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/infcom.2010.5462069","type":"proceedings-article","created":{"date-parts":[[2010,5,12]],"date-time":"2010-05-12T16:54:40Z","timestamp":1273683280000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Characterization of Non-Manipulable and Pareto Optimal Resource Allocation Strategies for Interference Coupled Wireless Systems"],"prefix":"10.1109","author":[{"given":"Holger","family":"Boche","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Siddharth","family":"Naik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tansu","family":"Alpcan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/JSAC.2006.872889"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s11036-006-5192-y"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/T-WC.2008.080182"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/49.414651"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1561\/0100000010","article-title":"QoS-Based Resource Allocation and Transceiver Optimization","volume":"2","author":"schubert","year":"0","journal-title":"Foundations and Trends in Communications and Information Theory 2005\/2006"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICC.2009.5198686"},{"key":"ref16","first-page":"203","article-title":"Secure Implementation","volume":"2","author":"saijo","year":"2007","journal-title":"Theoretical Economics"},{"key":"ref17","first-page":"9","article-title":"How to Implement Social Goals","author":"maskin","year":"2009"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1111\/1467-937X.00076"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/BF01832918"},{"key":"ref4","first-page":"1","article-title":"Design of Incentive Compatible Protocols for Wireless Networks: A Game Theoretic Approach","author":"suri","year":"2006","journal-title":"IEEE International Confernce on Computer Communications (INFOCOM)"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SFCS.2003.1238231"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/LCN.2004.25"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/COMSWA.2006.1665208"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s12046-008-0008-3"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/IPDPS.2004.1303255"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/CCECE.2004.1349713","article-title":"Strategyproof Trust Management in Wireless Ad hoc Network","volume":"3","author":"huiping","year":"2004","journal-title":"Electrical and Computer Engineering 2004 Canadian Conference on"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s12046-008-0009-2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1017\/CBO9780511800481"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1287\/moor.8.3.319"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TNET.2002.1012364"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/90.879343"},{"year":"2002","author":"kudryavtsev","journal-title":"Encyclopaedia of Mathematics","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1111\/j.1468-5876.2004.t01-1-00303.x"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/CDC.2009.5400297"}],"event":{"name":"IEEE INFOCOM 2010 - IEEE Conference on Computer Communications","start":{"date-parts":[[2010,3,14]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5461675\/5461899\/05462069.pdf?arnumber=5462069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T04:08:02Z","timestamp":1497845282000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5462069\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/infcom.2010.5462069","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}