{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:53Z","timestamp":1740140573723,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T00:00:00Z","timestamp":1559520000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T00:00:00Z","timestamp":1559520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1422-4","type":"journal-article","created":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T16:02:52Z","timestamp":1559577772000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient packet transmission in wireless ad hoc networks with partially informed nodes"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5375-842X","authenticated-orcid":false,"given":"Sara","family":"Berri","sequence":"first","affiliation":[]},{"given":"Samson","family":"Lasaulce","sequence":"additional","affiliation":[]},{"given":"Mohammed Said","family":"Radjef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,3]]},"reference":[{"key":"1422_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.physa.2017.12.032","volume":"494","author":"M Tan","year":"2018","unstructured":"M Tan, T Yang, X Chen, G Yang, G Zhu, P Holme, J Zhao, A game-theoretic approach to optimize ad-hoc networks inspired by small-world network topology. Physica A. 494:, 129\u2013139 (2018).","journal-title":"Physica A"},{"issue":"7","key":"1422_CR2","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/LSP.2018.2833425","volume":"25","author":"L Feng","year":"2018","unstructured":"L Feng, Q Yang, K Kim, K Kwak, Dynamic rate allocation and forwarding strategy adaption for wireless networks. IEEE Signal Proc. Lett.25(7), 1034\u20131038 (2018).","journal-title":"IEEE Signal Proc. Lett."},{"key":"1422_CR3","volume-title":"Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems","author":"N. Samian","year":"2017","unstructured":"N. Samian, W. K. G. Seah, in Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems. Trust-based scheme for cheating and collusion detection in wireless multihop networks (Computing, Networking and ServicesMelbourne, VIC, Australia, 2017)."},{"key":"1422_CR4","volume-title":"Proceedings of the 4th International Symposium on Ubiquitous Networking, Lecture Notes in Computer Science","author":"S. Berri","year":"2017","unstructured":"S. Berri, V. Varma, S. Lasaulce, M. S. Radjef, J. Daafouz, in Proceedings of the 4th International Symposium on Ubiquitous Networking, Lecture Notes in Computer Science. Studying node cooperation in reputation based packet forwarding within mobile ad hoc networks (Springer LNCSCasablanca, Maroc, 2017)."},{"issue":"10","key":"1422_CR5","first-page":"2091","volume":"45","author":"C Tang","year":"2015","unstructured":"C Tang, A Li, X Li, When reputation enforces evolutionary cooperation in unreliable MANETs. IEEE Trans. Cybern.45(10), 2091\u20132201 (2015).","journal-title":"IEEE Trans. Cybern."},{"key":"1422_CR6","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2015.04.012","volume":"54","author":"N. Samian","year":"2015","unstructured":"N. Samian, Z Ahmad Zukarnain, W. K. G Seah, A Abdullah, Z Mohd Hanapi, Cooperation stimulation mechanisms for wireless multihop networks: a survey. J. Netw. Comput. Appl.54:, 88\u2013106 (2015).","journal-title":"J. Netw. Comput. Appl."},{"issue":"143","key":"1422_CR7","first-page":"1","volume":"2015","author":"J. M. S. P. J Kumar","year":"2015","unstructured":"J. M. S. P. J Kumar, A Kathirvel, N Kirubakaran, P Sivaraman, M Subramaniam, A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT. EURASIP J. Wirel. Commun. Netw.2015(143), 1\u201311 (2015).","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"6","key":"1422_CR8","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1016\/j.adhoc.2011.12.010","volume":"10","author":"D. E. Charilas","year":"2012","unstructured":"D. E. Charilas, K. D. Georgilakis, A. D. Panagopoulos, ICARUS: hybrId inCentive mechAnism for coopeRation stimUlation in ad hoc networkS. Ad Hoc Netw.10(6), 976\u2013989 (2012).","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"1422_CR9","first-page":"24","volume":"2","author":"A Krzesinski","year":"2016","unstructured":"A Krzesinski, Promoting cooperation in mobile ad hoc networks. Int. J. Inf. Commun. Technol. Appl.2(1), 24\u201346 (2016).","journal-title":"Int. J. Inf. Commun. Technol. Appl."},{"issue":"8","key":"1422_CR10","doi-asserted-by":"publisher","first-page":"6692","DOI":"10.1109\/TVT.2015.2472289","volume":"65","author":"Q Xu","year":"2016","unstructured":"Q Xu, Z Su, S Guo, A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans. Veh. Technol.65(8), 6692\u20136702 (2016).","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1422_CR11","volume-title":"Proceedings of the IEEE Information Theory Workshop (ITW)","author":"B. Larrousse","year":"2015","unstructured":"B. Larrousse, S. Lasaulce, M. Wigger, in Proceedings of the IEEE Information Theory Workshop (ITW). Coordinating partially-informed agents over state-dependent networks (IEEE xploreJerusalem, 2015)."},{"doi-asserted-by":"crossref","unstructured":"B. Larrousse, S. Lasaulce, in Proceedings of the IEEE International Symposium on Information Theory. Coded power control: performance analysis, (2013).","key":"1422_CR12","DOI":"10.1109\/ISIT.2013.6620784"},{"issue":"5","key":"1422_CR13","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1109\/TIT.2018.2809008","volume":"64","author":"B Larrousse","year":"2018","unstructured":"B Larrousse, S Lasaulce, M Bloch, Coordination in distributed networks via coded actions with application to power control. IEEE Trans. Inf. Theory. 64(5), 3633\u20133654 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"1422_CR14","doi-asserted-by":"publisher","first-page":"3164","DOI":"10.1109\/TWC.2008.070227","volume":"7","author":"A Gjendemsj","year":"2008","unstructured":"A Gjendemsj, D Gesbert, G. E Oien, S. G Kiani, Binary power control for sum rate maximization over multiple interfering links. IEEE Trans. Wirel. Commun.7(8), 3164\u20133173 (2008).","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1422_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/9780470742891","volume-title":"LTE-the UMTS long term evolution: from theory to practice","author":"S. Sesia","year":"2009","unstructured":"S. Sesia, I. Toufik, M. Baker, LTE-the UMTS long term evolution: from theory to practice (Wiley Publishing, Hoboken, 2009)."},{"key":"1422_CR16","volume-title":"Entropy and Information Theory","author":"M. R. Gray","year":"2013","unstructured":"M. R. Gray, Entropy and Information Theory (Springer, New York, 2013)."},{"issue":"2","key":"1422_CR17","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/98.839331","volume":"7","author":"D. J Goodman","year":"2000","unstructured":"D. J Goodman, N Mandayam, A power control for wireless data. IEEE Pers. Commun.7(2), 48\u201354 (2000).","journal-title":"IEEE Pers. Commun."},{"issue":"6","key":"1422_CR18","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1109\/JSAC.2005.864028","volume":"24","author":"F Meshkati","year":"2006","unstructured":"F Meshkati, M Chiang, H. V Poor, S. C Schwartz, A game theoretic approach to energy-efficient power control in multicarrier CDMA systems. J. Sel. Areas Commun. 24(6), 1115\u20131129 (2006).","journal-title":"J. Sel. Areas Commun."},{"issue":"7","key":"1422_CR19","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1109\/TWC.2009.081443","volume":"8","author":"S Lasaulce","year":"2009","unstructured":"S Lasaulce, Y Hayel, R El Azouzi, M Debbah, Introducing hierarchy in energy games. IEEE Trans. Wirel. Commun.8(7), 3833\u20133843 (2009).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"1422_CR20","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TSP.2010.2086451","volume":"59","author":"E. V Belmega","year":"2011","unstructured":"E. V Belmega, S Lasaulce, Energy-efficient precoding for multiple-antenna terminals. IEEE Trans. Signal Process.59(1), 329\u2013340 (2011).","journal-title":"IEEE Trans. Signal Process."},{"key":"1422_CR21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139030687","volume-title":"Network information theory","author":"A. El Gamal","year":"2011","unstructured":"A. El Gamal, Y. Kim, Network information theory (Cambridge University Press, Cambridge, 2011)."},{"key":"1422_CR22","volume-title":"Proceedings of the IEEE International Sympsium on Signal Processing and Information Technology (ISSPIT)","author":"B. Djeumou","year":"2006","unstructured":"B. Djeumou, S. Lasaulce, A. G. Klein, in Proceedings of the IEEE International Sympsium on Signal Processing and Information Technology (ISSPIT). Combining decoded-and-forwarded signals in Gaussian cooperative channels (IEEE xploreVancouver, 2006)."},{"key":"1422_CR23","volume-title":"Game theory and learning for wireless networks: fundamentals and applications","author":"S. Lasaulce","year":"2011","unstructured":"S. Lasaulce, H. Tembine, Game theory and learning for wireless networks: fundamentals and applications (Academic Press, Elsevier, Amsterdam, 2011)."},{"issue":"1","key":"1422_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s00182-009-0197-y","volume":"39","author":"A Neyman","year":"2010","unstructured":"A Neyman, S Sorin, Repeated games with public uncertain duration process. Int. J. Game Theory. 39(1), 29\u201352 (2010).","journal-title":"Int. J. Game Theory"},{"key":"1422_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511794216","volume-title":"Game theory","author":"M. Maschler","year":"2013","unstructured":"M. Maschler, E. Solan, S. Zamir, Game theory (Cambridge University Press, Cambridge, 2013)."},{"issue":"1","key":"1422_CR26","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/BF01580367","volume":"11","author":"H Konno","year":"1976","unstructured":"H Konno, A cutting plane algorithm for solving bilinear programs. Math. Program.11(1), 14\u201327 (1976).","journal-title":"Math. Program."},{"issue":"1","key":"1422_CR27","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/BF01593787","volume":"12","author":"G Gallo","year":"1977","unstructured":"G Gallo, A Olkticti, Bilinear programming: an exact algorithm. Math. Program.12(1), 173\u2013194 (1977).","journal-title":"Math. Program."},{"issue":"2","key":"1422_CR28","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1002\/nav.3800230212","volume":"23","author":"H Vaish","year":"1976","unstructured":"H Vaish, C. M Shetty, The bilinear programming problem. Nav. Res. Logist. Q.23(2), 303\u2013309 (1976).","journal-title":"Nav. Res. Logist. Q."},{"key":"1422_CR29","volume-title":"Game theory","author":"D. Fudenberg","year":"1991","unstructured":"D. Fudenberg, J. Tirole, Game theory (MIT Press, Cambridge, 1991)."},{"key":"1422_CR30","volume-title":"Proceedings of the IEEE Fifth International Conference on Communications and Networking (ComNet)","author":"A. Agrawal","year":"2015","unstructured":"A. Agrawal, S. Lasaulce, O. Beaude, R. Visoz, in Proceedings of the IEEE Fifth International Conference on Communications and Networking (ComNet). A framework for decentralized power control with partial channel state information (IEEE xploreHammamet, Tunisia, 2015)."},{"key":"1422_CR31","volume-title":"Proceedings of the 33rd Annual ACM Symposium on Theory of Computing (STOC)","author":"C. H. Papadimitriou","year":"2001","unstructured":"C. H. Papadimitriou, in Proceedings of the 33rd Annual ACM Symposium on Theory of Computing (STOC). Algorithms, games, and the internet (ACM Digital LibraryNew York, 2001)."},{"key":"1422_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jtbi.2016.09.017","volume":"412","author":"S. D Yi","year":"2017","unstructured":"S. D Yi, S. K Baek, J. K Choi, Combination with anti-tit-for-tat remedies problems of tit-for-tat. J. Theor. Biol.412:, 1\u20137 (2017).","journal-title":"J. Theor. Biol."},{"issue":"10","key":"1422_CR33","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TSP.2008.929118","volume":"56","author":"S. M Betz","year":"2008","unstructured":"S. M Betz, H. V Poor, Energy rfficient communications in CDMA networks: a game theoretic analysis considering operating costs. IEEE Trans. Signal Process.56(10), 518\u20135190 (2008).","journal-title":"IEEE Trans. Signal Process."},{"key":"1422_CR34","volume-title":"Proceedings of the IEEE 70th Vehicular Technology Conference Fall","author":"F. Richter","year":"2009","unstructured":"F. Richter, A. J. Fehske, G. Fettweis, in Proceedings of the IEEE 70th Vehicular Technology Conference Fall. Energy efficiency aspects of base station deployment strategies for cellular networks (IEEE xploreAnchorage, 2009)."},{"issue":"7","key":"1422_CR35","first-page":"3218","volume":"64","author":"V Varma","year":"2015","unstructured":"V Varma, S Lasaulce, Y Hayel, S. E El Ayoubi, A cross-layer approach for energy-efficient distributed interference management. IEEE Trans. Veh. Technol.64(7), 3218\u20133232 (2015).","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1422-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1422-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1422-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T23:46:41Z","timestamp":1591055201000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1422-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,3]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1422"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1422-4","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,6,3]]},"assertion":[{"value":"25 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"148"}}