{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:22:49Z","timestamp":1745986969805,"version":"3.40.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T00:00:00Z","timestamp":1346976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1186\/1687-1499-2012-284","type":"journal-article","created":{"date-parts":[[2013,2,13]],"date-time":"2013-02-13T19:15:52Z","timestamp":1360782952000},"source":"Crossref","is-referenced-by-count":0,"title":["Mechanism design and implementation theoretic perspective for interference coupled wireless systems"],"prefix":"10.1186","volume":"2012","author":[{"given":"Holger","family":"Boche","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Siddharth","family":"Naik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tansu","family":"Alpcan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,9,7]]},"reference":[{"key":"529_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481","volume-title":"Algorithmic Game Theory","author":"N Nissan","year":"2007","unstructured":"Nissan N, Roughgarden T, Tardos E: Algorithmic Game Theory. (Cambridge University Press, Cambridge, 2007)"},{"issue":"7","key":"529_CR2","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/49.414651","volume":"13","author":"RD Yates","year":"1995","unstructured":"Yates RD: A framework for uplink power control in cellular radio systems. IEEE J. Sel. Areas Commun 1995, 13(7):1341-1348. 10.1109\/49.414651","journal-title":"IEEE J. Sel. Areas Commun"},{"key":"529_CR3","volume-title":"Found. Trends Commun. Inf. Theory","author":"M Schubert","year":"2006","unstructured":"Schubert M, Boche H: QoS-based resource allocation and transceiver optimization. Found. Trends Commun. Inf. Theory 2006., 2: 10.1561\/0100000010"},{"issue":"4","key":"529_CR4","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1287\/opre.1080.0638","volume":"57","author":"R Johari","year":"2009","unstructured":"Johari R, Tsitsiklis JN: Efficiency of scalar-parameterized mechanisms. Oper. Res 2009, 57(4):823-839. 10.1287\/opre.1080.0638","journal-title":"Oper. Res"},{"issue":"2","key":"529_CR5","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/18.749008","volume":"45","author":"DNC Tse","year":"1999","unstructured":"Tse DNC, Hanly SV: Linear multiuser receivers: effective interference, effective bandwidth and user capacity. IEEE Trans. Inf. Theory 1999, 45(2):641-657. 10.1109\/18.749008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"529_CR6","first-page":"203","volume":"2","author":"T Saijo","year":"2007","unstructured":"Saijo T, Sj\u00f6str\u00f6m T, Yamato T: Secure implementation. Theor. Econ 2007, 2: 203-229.","journal-title":"Theor. Econ"},{"key":"529_CR7","volume-title":"Microeconomic Theory","author":"A Mas-Colell","year":"1995","unstructured":"Mas-Colell A, Whinston MD, Green JR: Microeconomic Theory. (Oxford University Press, New York, 1995)"},{"key":"529_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1111\/1467-937X.00076","volume":"66","author":"E Maskin","year":"1999","unstructured":"Maskin E: Nash equilibrium and welfare optimality. Rev. Econ. Stud 1999, 66: 23-38. 10.1111\/1467-937X.00076","journal-title":"Rev. Econ. Stud"},{"key":"529_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/BF01832918","volume":"7","author":"S Babera","year":"1990","unstructured":"Babera S, Peleg B: Strategy-proof voting schemes with continuous preferences. Social Choice Welfare 1990, 7: 31-38. 10.1007\/BF01832918","journal-title":"Social Choice Welfare"},{"key":"529_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-8022-9","volume-title":"Axiomatic Bargaining Game Theory","author":"HJM Peters","year":"1992","unstructured":"Peters HJM: Axiomatic Bargaining Game Theory. (Kluwer Academic Publishers, Dordrecht, 1992)"},{"key":"529_CR11","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1287\/moor.8.3.319","volume":"8","author":"W Thomson","year":"1983","unstructured":"Thomson W: The fair division of a fixed supply among a growing population. Math. Oper. Res 1983, 8: 319-326. 10.1287\/moor.8.3.319","journal-title":"Math. Oper. Res"},{"issue":"8","key":"529_CR12","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/90.879343","volume":"5","author":"J Mo","year":"2000","unstructured":"Mo J, Walrand J: Fair end-to-end window-based congestion control. IEEE\/ACM Trans. Netw 2000, 5(8):556-567.","journal-title":"IEEE\/ACM Trans. Netw"},{"issue":"10","key":"529_CR13","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TNET.2002.1012364","volume":"3","author":"L Massoulie","year":"2002","unstructured":"Massoulie L, Roberts J: Bandwidth sharing: objectives and algorithms. IEEE\/ACM Trans. Netw 2002, 3(10):320-328.","journal-title":"IEEE\/ACM Trans. Netw"},{"key":"529_CR14","unstructured":"Chung KS, Ely JC: Foundations of dominant strategy mechanisms. Robust Mechanism Design (Cowles Foundation for Research in Economics, Yale University, 2004)"},{"issue":"11","key":"529_CR15","doi-asserted-by":"publisher","first-page":"4330","DOI":"10.1109\/TIT.2007.907475","volume":"53","author":"J Price","year":"2007","unstructured":"Price J, Javidi T: Leveraging downlink for efficient uplink allocation in a single-hop wireless network. IEEE Trans. Inf. Theory 2007, 53(11):4330-4339.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"529_CR16","doi-asserted-by":"publisher","first-page":"587","DOI":"10.2307\/1914083","volume":"41","author":"A Gibbard","year":"1973","unstructured":"Gibbard A: Manipulation of voting schemes: a general result. Econometrica 1973, 41: 587-601. 10.2307\/1914083","journal-title":"Econometrica"},{"issue":"2","key":"529_CR17","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0022-0531(75)90050-2","volume":"10","author":"MA Satterthwaite","year":"1975","unstructured":"Satterthwaite MA: Strategy-proofness and arrow\u2019s conditions: existence and correspondence theorems for voting procedures and social welfare functions. J. Econ. Theory 1975, 10(2):187-217. 10.1016\/0022-0531(75)90050-2","journal-title":"J. Econ. Theory"},{"issue":"2","key":"529_CR18","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1111\/j.1468-5876.2004.t01-1-00303.x","volume":"55","author":"M Kato","year":"2004","unstructured":"Kato M, Ohseto S: Non-dummy agents in pure exchange economies. Jpn. Econ. Rev 2004, 55(2):212-220. 10.1111\/j.1468-5876.2004.t01-1-00303.x","journal-title":"Jpn. Econ. Rev"},{"key":"529_CR19","unstructured":"Alpcan T: Noncooperative games for control of networked systems. PhD thesis, University of Illinois at Urbana-Champaign, Urbana, IL, 2006"},{"key":"529_CR20","doi-asserted-by":"crossref","unstructured":"Naik S, Alpcan T, Boche H: A Nash equilibrium analysis of interference coupled wireless systems,. IEEE ICC, Cape Town, South Africa, 2010","DOI":"10.1109\/ICC.2010.5502734"},{"key":"529_CR21","doi-asserted-by":"crossref","unstructured":"Schubert M, Boche H: A unifying theory for uplink and downlink multi-user beamforming,. International Zurich Seminar on Broadband Communications, 2002, pp. 27-1\u201327-5","DOI":"10.1109\/IZSBC.2002.991770"},{"key":"529_CR22","doi-asserted-by":"crossref","unstructured":"Stanczak S, Boche H, Wiczanowski M: Towards better understanding of medium access control for multiuser beamforming systems,. IEEE WCNC, 2005, pp. 689\u2013694","DOI":"10.1109\/WCNC.2005.1424591"},{"key":"529_CR23","unstructured":"Hurwicz L: Decision and Organization,. chap. on Informationally Decentralized Systems (North-Holland, Amsterdam, 1972), pp. 297\u2013336"},{"key":"529_CR24","doi-asserted-by":"publisher","first-page":"185","DOI":"10.2307\/2297045","volume":"46","author":"P Dasgupta","year":"1979","unstructured":"Dasgupta P, Hammmond P, Maskin E: The implementation of social choice rules: some general results of incentive Compatibility. Rev. Econ. Stud 1979, 46: 185-216. 10.2307\/2297045","journal-title":"Rev. Econ. Stud"},{"key":"529_CR25","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/BF00177662","volume":"8","author":"L Zhou","year":"1991","unstructured":"Zhou L: Inefficiency of strategy-proof allocation mechanisms in pure exchange economies. Social Choice Welfare 1991, 8: 247-254.","journal-title":"Social Choice Welfare"},{"key":"529_CR26","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s003550100143","volume":"19","author":"M Kato","year":"2002","unstructured":"Kato M, Ohseto S: Towards general impossibility theorems in pure exchange economies. Social Choice Welfare 2002, 19: 659-664. 10.1007\/s003550100143","journal-title":"Social Choice Welfare"},{"key":"529_CR27","doi-asserted-by":"publisher","first-page":"587","DOI":"10.2307\/2297198","volume":"48","author":"MA Satterthwaite","year":"1981","unstructured":"Satterthwaite MA, Sonnenschein H: Strategy-proof allocation mechanisms at differntiable points. Rev. Econ. Stud 1981, 48: 587-597. 10.2307\/2297198","journal-title":"Rev. Econ. Stud"},{"key":"529_CR28","doi-asserted-by":"publisher","first-page":"661","DOI":"10.2307\/1911705","volume":"49","author":"S Reichelstein","year":"1988","unstructured":"Reichelstein S, Reiter S: Game forms with minimal strategy spaces. Econometrica 1988, 49: 661-692.","journal-title":"Econometrica"},{"key":"529_CR29","unstructured":"Lazar AA, Semret N: The progressive second price auction mechanism for network resource sharing,. International Symposium on Dynamic Games and Applications, Maastricht, Netherlands, 1998"},{"key":"529_CR30","doi-asserted-by":"crossref","unstructured":"Jia P, Caines PE: Equilibria and convergence of auctions on networks,. Proceedings of International Conference on Game Theory for Networks (GameNets2009), Istanbul, Turkey, 2009, pp. 268\u2013276","DOI":"10.1109\/GAMENETS.2009.5137410"},{"issue":"6","key":"529_CR31","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/JSAC.2007.070817","volume":"25","author":"S Yang","year":"2007","unstructured":"Yang S, Hajek B: VCG-Kelly mechanisms for allocation of divisible goods: adapting VCG mechanisms to one-dimensional signals. IEEE J. Sel. Areas Commun 2007, 25(6):1237-1243.","journal-title":"IEEE J. Sel. Areas Commun"},{"key":"529_CR32","doi-asserted-by":"crossref","unstructured":"Maheswaran RT, Basar T: Social welfare of selfish agents: motivating efficiency for divisible resources,. 43rd IEEE Conference on Decision and Control (CDC), vol. 2, 2004, pp. 1550\u20131555","DOI":"10.1109\/CDC.2004.1430264"},{"key":"529_CR33","doi-asserted-by":"crossref","unstructured":"Dimakis A, Jain R, Walrand J: Mechanisms for efficient allocation in divisible capacity networks,. 45th IEEE Conference on Decision and Control (CDC), San Diego, CA, USA, 2006","DOI":"10.1109\/CDC.2006.377178"},{"key":"529_CR34","first-page":"1593","volume-title":"Canadian Conference on Electrical and Computer Engineering","author":"S Huiping","year":"2004","unstructured":"Huiping S, Junde S: Strategyproof trust management in wireless ad hoc network,. Canadian Conference on Electrical and Computer Engineering, 2004, vol. 3, 2004, pp. 1593\u20131596"},{"key":"529_CR35","first-page":"584","volume-title":"Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science","author":"M Pal","year":"2003","unstructured":"Pal M, Tardos E: Group strategy proof mechanisms via primal-dual algorithms,. Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, 2003, 2003 pp. 584\u2013593"},{"key":"529_CR36","doi-asserted-by":"crossref","unstructured":"Suri NR: Design of incentive compatible protocols for wireless networks: a game theoretic approach,. IEEE International Confernce on Computer Communications (INFOCOM), 2006, pp. 1\u20132","DOI":"10.1109\/INFOCOM.2006.74"},{"key":"529_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/COMSWA.2006.1665208","volume-title":"First International Conference on Communication System Software and Middleware","author":"NR Suri","year":"2006","unstructured":"Suri NR, Narahari Y, Manjunath D: An efficient pricing based protocol for broadcasting in wireless ad hoc networks,. First International Conference on Communication System Software and Middleware, 2006. Comsware 2006, 2006, pp. 1\u20137"},{"key":"529_CR38","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/LCN.2004.25","volume-title":"29th Annual IEEE International Conference on Local Computer Networks","author":"Z Guanxiang","year":"2004","unstructured":"Guanxiang Z, Yan L, Zongkai Y, Wenqing C: Auction-based admission control and pricing for priority services,. 29th Annual IEEE International Conference on Local Computer Networks, 2004, 2004, pp. 398\u2013399"},{"key":"529_CR39","first-page":"219","volume-title":"Proceedings of the 18th International Parallel and Distributed Processing Symposium","author":"WZ Wang","year":"2004","unstructured":"Wang WZ, Li XY: Truthful low-cost unicast in selfish wireless networks,. Proceedings of the 18th International Parallel and Distributed Processing Symposium, 2004, 2004, p. 219"},{"issue":"3","key":"529_CR40","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s12046-008-0008-3","volume":"33","author":"D Garg","year":"2008","unstructured":"Garg D, Narahari Y, Gujar S: Foundations of mechanism design: a tutorial. Part 1\u2014key concepts and classical results. Sadhana 2008, 33(3):83-130.","journal-title":"Sadhana"},{"issue":"2","key":"529_CR41","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s12046-008-0009-2","volume":"33","author":"D Garg","year":"2008","unstructured":"Garg D, Narahari Y, Gujar S: Foundations of mechanism design: a tutorial. Part 2\u2014advanced concepts and results. Sadhana 2008, 33(2):131-174. 10.1007\/s12046-008-0009-2","journal-title":"Sadhana"},{"issue":"5","key":"529_CR42","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1109\/JSAC.2006.872889","volume":"24","author":"J Huang","year":"2006","unstructured":"Huang J, Berry R, Honig M: Distributed interference compensation for wireless networks. IEEE J. Sel. Areas Commun 2006, 24(5):1074-1084.","journal-title":"IEEE J. Sel. Areas Commun"},{"issue":"5","key":"529_CR43","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11036-006-5192-y","volume":"24","author":"J Huang","year":"2006","unstructured":"Huang J, Berry R, Honig M: Auction-based spectrum sharing. ACM Mob. Netw. Appl. J 2006, 24(5):405-418.","journal-title":"ACM Mob. Netw. Appl. J"},{"issue":"4","key":"529_CR44","doi-asserted-by":"publisher","first-page":"1922","DOI":"10.1109\/T-WC.2008.080182","volume":"8","author":"Y Wu","year":"2009","unstructured":"Wu Y, Wang B, Liu KJR, Clancy TC: Repeated open spectrum sharing game with cheat-proof strategies. IEEE Trans. Wirel. Commun 2009, 8(4):1922-1933.","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"6","key":"529_CR45","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1109\/TNET.2009.2020162","volume":"17","author":"S Sharma","year":"2009","unstructured":"Sharma S, Teneketzis D: An Externalities-Based Decentralized Optimal Power Allocation Algorithm for Wireless Networks. IEEE\/ACM Trans. on Networking 2009, 17(6):1819-1831.","journal-title":"IEEE\/ACM Trans. on Networking"},{"key":"529_CR46","doi-asserted-by":"crossref","unstructured":"Kakhbod A, Teneketzis D: An individually rational, budget-balanced mechanism that implements in Nash equilibria the solution of the unicast service provisioning problem,. Proceedings of the 47th annual Allerton conference on Communication, control, and computing, 2009","DOI":"10.1109\/ALLERTON.2009.5394515"},{"key":"529_CR47","doi-asserted-by":"crossref","unstructured":"Procaccia AD, Tennenholtz M: Approximate mechanism design without money,. Proceedings of the 10th ACM Conference on Electronic Commerce, Stanford, CA, USA, 2009","DOI":"10.1145\/1566374.1566401"},{"key":"529_CR48","doi-asserted-by":"crossref","unstructured":"Boche H, Schubert M: Unified framework for interference modeling of multi-user wireless networks,. IEEE International Conference on Communications (ICC), Dresden, Germany, 2009","DOI":"10.1109\/ICC.2009.5198686"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2012-284\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-284.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-284.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T21:14:08Z","timestamp":1745961248000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2012-284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,7]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["529"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2012-284","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2012,9,7]]},"article-number":"284"}}