{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T10:08:52Z","timestamp":1775210932286,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/wiopt.2008.4586088","type":"proceedings-article","created":{"date-parts":[[2008,8,6]],"date-time":"2008-08-06T16:13:51Z","timestamp":1218039231000},"page":"344-351","source":"Crossref","is-referenced-by-count":9,"title":["Evolutionary games with random number of interacting players applied to access control"],"prefix":"10.1109","author":[{"given":"Hamidou","family":"Tembine","sequence":"first","affiliation":[]},{"given":"Eitan","family":"Altman","sequence":"additional","affiliation":[]},{"given":"Rachid","family":"El-Azouzi","sequence":"additional","affiliation":[]},{"given":"Yezekael","family":"Hayel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"a one-shot random access game","author":"inaltekin","year":"2005","journal-title":"Inter Conference on Wireless Networks Comm and Mobile Computing"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173179"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.314"},{"key":"1","article-title":"an evolutionary game perspective to aloha with power control","author":"bonneau","year":"2005","journal-title":"19th International Teletraffic Congress"},{"key":"7","author":"tembine","year":"2007","journal-title":"Multiple Access Game in Ad-hoc Network GameComm"},{"key":"6","author":"tembine","year":"2007","journal-title":"Asymmetric Delay in Evolutionary Games Valuetools"},{"key":"5","author":"tembine","year":"2007","journal-title":"Delayed Evolutionary Game Dynamics applied to the Medium Access Control Bionetworks"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1038\/246015a0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2000.2696"},{"key":"8","article-title":"evolutionary games with random number of interacting players applied to access control","author":"tembine","year":"2007","journal-title":"LIA technical report"},{"key":"11","author":"weibull","year":"1995","journal-title":"Evolutionary Game Theory"}],"event":{"name":"2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOPT)","location":"Berlin, Germany","start":{"date-parts":[[2008,4,1]]},"end":{"date-parts":[[2008,4,3]]}},"container-title":["2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4568415\/4586016\/04586088.pdf?arnumber=4586088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T14:45:57Z","timestamp":1489675557000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4586088\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2008.4586088","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}