{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T21:10:02Z","timestamp":1741468202047,"version":"3.38.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/sahcn.2011.5984937","type":"proceedings-article","created":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T19:27:23Z","timestamp":1313522843000},"page":"512-520","source":"Crossref","is-referenced-by-count":1,"title":["Analyzing credit evolution for credit-based incentive schemes in wireless mesh networks"],"prefix":"10.1109","author":[{"given":"Patrick P. C.","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hongying","family":"Liu","sequence":"additional","affiliation":[]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2161770"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984937"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134723"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061936"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1017\/S0022050701025086"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(00)00205-3"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proc MOBICOM 00"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287865"},{"journal-title":"Linear Programming and Extensions","year":"1963","author":"dantzig","key":"3"},{"key":"2","first-page":"134","author":"evans","year":"2000","journal-title":"Statistical Distributions"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198572237.001.0001","author":"grimmett","year":"2001","journal-title":"Probability and Random Process"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/1080829.1080841","article-title":"On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks - An integrated approach using game theoretical and cryptographic techniques","author":"zhong","year":"2005","journal-title":"Proc of MobiCom'05"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/1080829.1080833","article-title":"Atchitecture and evaluation of an unplanned 802.11b mesh network","author":"bicket","year":"2005","journal-title":"Proc of MobiCom'05"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/938998.939000"},{"journal-title":"The network simulator - ns-2","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"}],"event":{"name":"2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)","start":{"date-parts":[[2011,6,27]]},"location":"Salt Lake City, UT, USA","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5970760\/5984877\/05984937.pdf?arnumber=5984937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T20:40:10Z","timestamp":1741466410000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5984937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2011.5984937","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}