{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:19:05Z","timestamp":1730305145981,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/wd.2008.4812857","type":"proceedings-article","created":{"date-parts":[[2009,4,10]],"date-time":"2009-04-10T15:39:42Z","timestamp":1239377982000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Noncooperative QoS support in an Ad Hoc WLAN"],"prefix":"10.1109","author":[{"given":"Jerzy","family":"Konorski","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/978-94-010-0189-2"},{"year":"1991","author":"fudenberg","journal-title":"Game Theory","key":"15"},{"key":"16","article-title":"stand-off and stand-off resolution in deadlock- free networks","author":"grover","year":"0","journal-title":"IBM Tech Rep"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/49.840210"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1016\/j.jda.2006.12.004"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/MASCOTS.2005.67"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/TNET.2006.886298"},{"key":"3","article-title":"802.11 denial-of-service attacks: real vulnerabilities and practical solutions","author":"bellardo","year":"2003","journal-title":"Proc Usenix Security Symposium"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","first-page":"1435","article-title":"energyefficient power and rate control with qos constraints: a game-theoretic approach","author":"meshkati","year":"2006","journal-title":"Proc WCMC'06"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/INFCOM.2005.1498536"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1164717.1164763"},{"year":"0","journal-title":"Wi-Fi Alliance website","key":"5"},{"key":"4","article-title":"game theory models for ieee 802.11 dcf in wireless ad hoc networks","volume":"43","author":"xiao","year":"2005","journal-title":"IEEE Radio Communications"},{"key":"9","article-title":"cooperative and non-cooperative control in ieee 802.11 wlans","author":"altman","year":"0","journal-title":"INRIA Tech Rep"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/ICDCS.2007.138"}],"event":{"name":"2008 1st IFIP Wireless Days (WD)","start":{"date-parts":[[2008,11,24]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2008,11,27]]}},"container-title":["2008 1st IFIP Wireless Days"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4808202\/4812823\/04812857.pdf?arnumber=4812857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:33:03Z","timestamp":1489764783000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4812857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/wd.2008.4812857","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}