{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:51:36Z","timestamp":1725537096864},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/sahcn.2009.5168920","type":"proceedings-article","created":{"date-parts":[[2009,7,22]],"date-time":"2009-07-22T10:23:35Z","timestamp":1248258215000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Cooperation in Ad Hoc Networks with Noisy Channels"],"prefix":"10.1109","author":[{"given":"Wenjing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Mainak","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Kwiat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2001.2853"},{"key":"35","first-page":"456","article-title":"cooperation enforcement in ad hoc networks under unreliable channel","author":"wang","year":"2008","journal-title":"IEEE MASS"},{"key":"17","first-page":"460","article-title":"cooperation enforcement in autonomous manets under noise and imperfect observation","author":"ji","year":"2006","journal-title":"IEEE SECON"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1026"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208918"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064022"},{"key":"34","first-page":"402","article-title":"ours: optimal unicast routing system in non-cooperative wireless networks","author":"wang","year":"2006","journal-title":"ACM MOBICOM"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287865"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(04)00031-8"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.68"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080841"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281620"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0262.2006.00669.x"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.2307\/1912767"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374657"},{"key":"24","first-page":"231","article-title":"sustaining cooperation in multi-hop wireless networks","author":"mahajan","year":"0","journal-title":"NSDI 2005"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/35.965370"},{"key":"26","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/345910.345955","article-title":"mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"ACM MOBICOM"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.07.006"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1190195.1190197"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/939010.939011"},{"key":"2","first-page":"82","article-title":"some game-theoretic problems in wireless ad-hoc networks","author":"altman","year":"2004","journal-title":"EuroNGI Workshop"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2307\/2938299"},{"journal-title":"An Introduction to Game Theory","year":"2004","author":"osborne","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/35.925685"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2001.2878"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904764"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1992.287121"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.7"},{"journal-title":"Observation-Based Cooperation Enforcement in Ad hoc Networks","year":"2003","author":"bansal","key":"4"},{"journal-title":"Nuglets A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks","year":"2001","author":"buttya?n","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"}],"event":{"name":"2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks","start":{"date-parts":[[2009,6,22]]},"location":"Rome, Italy","end":{"date-parts":[[2009,6,26]]}},"container-title":["2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5168894\/5168895\/05168920.pdf?arnumber=5168920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T18:11:18Z","timestamp":1497809478000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5168920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2009.5168920","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}