{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:47:19Z","timestamp":1725511639653},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/wiopt.2008.4586073","type":"proceedings-article","created":{"date-parts":[[2008,8,6]],"date-time":"2008-08-06T16:13:51Z","timestamp":1218039231000},"page":"251-259","source":"Crossref","is-referenced-by-count":4,"title":["Impact of selfish packet forwarding on energy-efficient topology control"],"prefix":"10.1109","author":[{"given":"Ramakant S.","family":"Komali","sequence":"first","affiliation":[]},{"given":"Allen B.","family":"MacKenzie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/s11036-005-4452-6","article-title":"strategyproof mechanisms towards evolutionary topology formation in autonomous networks","author":"yuen","year":"2005","journal-title":"ACM\/Kluwer Mobile Networks and Applications (MONET) Special Issue on Non-Cooperative Wireless Networking and Computing"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593279"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160976"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311661"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.826324"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992757"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2001.965296"},{"key":"11","article-title":"maca- a new channel access method for packet radio","author":"karn","year":"1990","journal-title":"Proc 9th ARRL Comput Netw Conf"},{"year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.17"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-4468-y"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1593087"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016627727877"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570651"},{"journal-title":"Game Theory","year":"1991","author":"fudenberg","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"5","article-title":"cooperation in wireless ad hoc networks","author":"srinivasan","year":"2003","journal-title":"Proc of IEEE INFOCOM"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.68"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208697"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2000.2694"}],"event":{"name":"2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOPT)","start":{"date-parts":[[2008,4,1]]},"location":"Berlin, Germany","end":{"date-parts":[[2008,4,3]]}},"container-title":["2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4568415\/4586016\/04586073.pdf?arnumber=4586073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T06:41:59Z","timestamp":1497768119000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4586073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2008.4586073","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}