{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:33Z","timestamp":1740141813374,"version":"3.37.3"},"reference-count":19,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,11,1]]},"abstract":"<jats:p> A hierarchical machine-to-machine (M2M) communication network, where multiple heterogeneous devices compete for transmission on congested links, is considered. In such a network, the cluster headers gather the network coding and routing messages from multiple M2M devices and forward them to the cellular network. We propose a novel discriminatory user-based utility mechanism for network coding users and routing users. The price of anarchy (PoA), which is used to characterize the worst-case efficiency bounds, is analyzed. The simulation results show that network coding could promote the efficiency to a certain extent. <\/jats:p>","DOI":"10.1155\/2013\/584707","type":"journal-article","created":{"date-parts":[[2013,11,20]],"date-time":"2013-11-20T21:53:03Z","timestamp":1384984383000},"page":"584707","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Game-Theoretic Analysis of Multiple Protocol Data Flows in Hierarchical M2M Communication Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Gang","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"}]},{"given":"Jie","family":"Leng","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5705-0912","authenticated-orcid":false,"given":"Lin","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"}]}],"member":"179","published-online":{"date-parts":[[2013,11,20]]},"reference":[{"key":"B2-2013-584707","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/963758"},{"key":"B3-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.54"},{"key":"B4-2013-584707","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/840391"},{"key":"B5-2013-584707","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/476313"},{"key":"B6-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"B7-2013-584707","volume-title":"Network Coding: Fundamentals and Applications","author":"Muriel M.","year":"2011","edition":"1"},{"key":"B8-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5675777"},{"key":"B9-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2007.4665259"},{"key":"B10-2013-584707","doi-asserted-by":"publisher","DOI":"10.2307\/2526164"},{"key":"B11-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6507400"},{"key":"B12-2013-584707","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/504205"},{"first-page":"199","volume-title":"Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief","author":"Vaidya R.","key":"B13-2013-584707"},{"first-page":"823","volume-title":"Proceedings of the 15th International Conference on Advanced Communication Technology","author":"Chen J. L.","key":"B14-2013-584707"},{"key":"B16-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163599"},{"key":"B17-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.872880"},{"key":"B18-2013-584707","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198609"},{"issue":"3","key":"B19-2013-584707","first-page":"567","volume":"22","author":"Wang G.","year":"2013","journal-title":"Chinese Journal of Electronics"},{"volume-title":"Design of Price Mechanisms for Network Resource Allocation via Price of Anarchy","year":"2005","author":"Chen Y.","key":"B20-2013-584707"},{"key":"B21-2013-584707","doi-asserted-by":"publisher","DOI":"10.2307\/1912768"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/584707","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/584707","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/584707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:26:58Z","timestamp":1621200418000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/584707"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,1]]},"references-count":19,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2013,11,1]]}},"alternative-id":["10.1155\/2013\/584707"],"URL":"https:\/\/doi.org\/10.1155\/2013\/584707","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,11,1]]}}}