Author:
Seredynski Michal,Kotowski Romuald,Ma̧ka Wojciech
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Axelrod, R.: The Evolution of Strategies in the Iterated Prisoner’s Dilemma. In: Genetic Algorithms and Simulated Annealing, Pitmann, pp. 31–41 (1987)
2. Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: Proceedings of MobiHoc, pp. 226–236 (2002)
3. Buttyan, L., Hubaux, J.P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM Journal for Mobile Networks (2002)
4. Howley, E., O’Riordan, C.: The Emergence of Cooperation among Agents using Simple Fixed Bias Tagging. In: Proceedings of Congress on Evolutionary Computation 2005, pp. 1011–1016 (2005)
5. Ilyas, M. (ed.): Mobile Computing Handbook. Auerbach Publications (2005)