Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference90 articles.
1. Game theoretic approaches for multiple access in wireless networks;Akkarajitsakul;IEEE Commun Surv Tutor,2011
2. Anderegg L, Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the 9th international conference on mobile computing and networking (MobiCom). San Diego, CA; 14–19 September 2003. p. 245–59 [2].
3. Collusion in dynamic Bertrand oligopoly with correlated private signals and communication;Aoyagi;J Econ Theory,2002
4. Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H. An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM workshop on wireless security (WiSE). Atlanta, GA, USA; 28 September 2002. p. 21–30 [4].
5. Balakrishnan K, Deng J, Varshney PK. TWOACK: preventing selfishness in mobile ad hoc networks. In: Proceedings of the IEEE wireless communications and networking conference (WCNC). New Orleans, LA, USA; 13–17 March 2005. p. 2137–42 [5].
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献