{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:28Z","timestamp":1738777228209,"version":"3.37.0"},"reference-count":17,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.6.1603-1609","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T02:59:48Z","timestamp":1402369188000},"source":"Crossref","is-referenced-by-count":1,"title":["Game-theory Model based on Carrier Sense Multiple Access Protocol in Wireless Network"],"prefix":"10.4304","volume":"9","author":[{"given":"Jun","family":"Tian","sequence":"first","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,6,9]]},"reference":[{"issue":"3","key":"ref1","first-page":"626","article-title":"Dynamic spectrum access in open spectrum wireless networks. Selected Areas in Communications","volume":"24","author":"Xing","year":"2006","unstructured":"[1] Xing Y, Chandramouli R, Mangold S, et al. Dynamic spectrum access in open spectrum wireless networks. Selected Areas in Communications, IEEE Journal on, 2006, 24 (3) pp. 626-637.","journal-title":"IEEE Journal on"},{"issue":"4","key":"ref2","first-page":"1665","article-title":"Performance analysis of contention based medium access control protocols. Information Theory","volume":"55","author":"Sharma","year":"2009","unstructured":"[3] Sharma G, Ganesh A, Key P. Performance analysis of contention based medium access control protocols. Information Theory, IEEE Transactions on, 2009, 55(4) pp. 1665-1682.","journal-title":"IEEE Transactions on"},{"issue":"9","key":"ref3","first-page":"1283","article-title":"Adaptive optimization of IEEE 802.11 DCF based on Bayesian estimation of the number of competing terminals. Mobile Computing","volume":"5","author":"Toledo","year":"2006","unstructured":"[4] Toledo A L, Vercauteren T, Wang X. Adaptive optimization of IEEE 802.11 DCF based on Bayesian estimation of the number of competing terminals. Mobile Computing, IEEE Transactions on, 2006, 5(9) pp. 1283-1296.","journal-title":"IEEE Transactions on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122310.000119"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1028874"},{"issue":"3","key":"ref6","first-page":"332","article-title":"A noncooperative game-theoretic framework for radio resource management in 4G heterogeneous wireless access networks. Mobile Computing","volume":"7","author":"Niyato","year":"2008","unstructured":"[9] Niyato D, Hossain E. A noncooperative game-theoretic framework for radio resource management in 4G heterogeneous wireless access networks. Mobile Computing, IEEE Transactions on, 2008, 7(3) pp. 332-345.","journal-title":"IEEE Transactions on"},{"key":"ref7","article-title":"Co-existence and Interworking of IEEE 802.11 a and ETSI BRAN HiperLAN\/2 in MultiHop Scenarios \/\/Proc.","volume-title":"IEEE Workshop on Wireless Local Area Networks","author":"Mangold","year":"2001","unstructured":"[11] Mangold S, Habetha J, Choi S, et al. Co-existence and Interworking of IEEE 802.11 a and ETSI BRAN HiperLAN\/2 in MultiHop Scenarios \/\/Proc. IEEE Workshop on Wireless Local Area Networks. 2001."},{"issue":"6","key":"ref8","first-page":"1124","article-title":"Robust detection of selfish misbehavior in wireless networks. Selected Areas in Communications","volume":"25","author":"Toledo","year":"2007","unstructured":"[13] Toledo A L, Wang X. Robust detection of selfish misbehavior in wireless networks. Selected Areas in Communications, IEEE Journal on, 2007, 25(6) pp. 1124-1134.","journal-title":"IEEE Journal on"},{"issue":"19","key":"ref9","article-title":"Research on Improved Network Data Fault-Tolerant Transmission Optimization Algorithm.","volume":"7","author":"Xia","year":"2012","unstructured":"[16] Xia K, Cai J, Wu Y. Research on Improved Network Data Fault-Tolerant Transmission Optimization Algorithm. Journal of Convergence Information Technology, 2012, 7(19).","journal-title":"Journal of Convergence Information Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.7.1632-1639"},{"issue":"3","key":"ref11","first-page":"587","article-title":"Spectrum sharing in cognitive radio networks\u2014an auction-based approach. Systems, Man, and Cybernetics, Part B: Cybernetics","volume":"40","author":"Wang","year":"2010","unstructured":"[25] Wang X, Li Z, Xu P, et al. Spectrum sharing in cognitive radio networks\u2014an auction-based approach. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 2010, 40(3) pp. 587-596.","journal-title":"IEEE Transactions on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5978425"},{"key":"ref13","volume-title":"Security models for wireless sensor networks PhD Conversion Report","author":"Kaplantzis","year":"2006","unstructured":"[28] Kaplantzis S, Mani N, Palaniswanmi M, et al. Security models for wireless sensor networks. PhD Conversion Report, Centre of Telecommunications and Information Engineering, Monash University, Australia, 2006."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.911284"},{"issue":"1","key":"ref15","first-page":"82","article-title":"Multichannel opportunistic carrier sensing for stable channel access control in cognitive radio systems. Selected Areas in Communications","volume":"30","author":"Leshem","year":"2012","unstructured":"[33] Leshem A, Zehavi E, Yaffe Y. Multichannel opportunistic carrier sensing for stable channel access control in cognitive radio systems. Selected Areas in Communications, IEEE Journal on, 2012, 30(1) pp. 82-95.","journal-title":"IEEE Journal on"},{"issue":"5","key":"ref16","first-page":"1889","article-title":"A cartel maintenance framework to enforce cooperation in wireless networks with selfish users. Wireless Communications","volume":"7","author":"Han","year":"2008","unstructured":"[34] Han Z, Ji Z, Liu K J R. A cartel maintenance framework to enforce cooperation in wireless networks with selfish users. Wireless Communications, IEEE Transactions on, 2008, 7(5) pp. 1889-1899.","journal-title":"IEEE Transactions on"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.012012.100426"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:43Z","timestamp":1738775203000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,9]]},"references-count":17,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,9]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.6.1603-1609","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,6,9]]}}}