
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Ramakant S. Komali, Allen B. MacKenzie, Robert P. Gilles, "Effect of Selfish Node Behavior on Efficient Topology Design," IEEE Transactions on Mobile Computing, vol. 7, no. 9, pp. 10571070, September, 2008.  
BibTex  x  
@article{ 10.1109/TMC.2008.17, author = {Ramakant S. Komali and Allen B. MacKenzie and Robert P. Gilles}, title = {Effect of Selfish Node Behavior on Efficient Topology Design}, journal ={IEEE Transactions on Mobile Computing}, volume = {7}, number = {9}, issn = {15361233}, year = {2008}, pages = {10571070}, doi = {http://doi.ieeecomputersociety.org/10.1109/TMC.2008.17}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Mobile Computing TI  Effect of Selfish Node Behavior on Efficient Topology Design IS  9 SN  15361233 SP1057 EP1070 EPD  10571070 A1  Ramakant S. Komali, A1  Allen B. MacKenzie, A1  Robert P. Gilles, PY  2008 KW  Network topology KW  Network management KW  Algorithm/protocol design and analysis VL  7 JA  IEEE Transactions on Mobile Computing ER   
[1] C.E. Jones, K.M. Sivalingam, P. Agrawal, and J.C. Chen, “A Survey of Energy Efficient Network Protocols for Wireless Networks,” Wireless Networks, vol. 7, no. 4, pp. 343358, Aug. 2001.
[2] P. Gupta and P.R. Kumar, “The Capacity of Wireless Networks,” IEEE Trans. Information Theory, vol. 46, pp. 388404, Mar. 2000.
[3] P. Santi, “Topology Control in Wireless Ad Hoc and SensorNetworks,” ACM Computing Surveys, vol. 37, pp. 164194, Mar. 2005.
[4] R. Rajaraman, “Topology Control and Routing in Ad Hoc Networks: A Survey,” SIGACT News, vol. 33, pp. 6073, June 2002.
[5] N.S. Glance and B.A. Huberman, “Dynamics of Social Dilemmas,” Scientific Am., vol. 270, Mar. 1994.
[6] L. Li, J.Y. Halpern, P. Bahl, Y.M. Wang, and R. Wattenhofer, “A ConeBased Distributed TopologyControl Algorithm for Wireless MultiHop Networks,” IEEE/ACM Trans. Networking, vol. 13, pp.147159, Feb. 2005.
[7] V. Rodoplu and T.H. Meng, “Minimum Energy Mobile Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 17, pp. 13331344, Aug. 1999.
[8] R. Ramanathan and R. RosalesHain, “Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment,” Proc. IEEE INFOCOM '00, vol. 2, pp. 404413, Mar. 2000.
[9] N. Li, J. Hou, and L. Sha, “Design and Analysis of an MSTBased Topology Control Algorithm,” Proc. IEEE INFOCOM '03, vol. 3, pp. 17021712, Apr. 2003.
[10] M.K.H. Yeung and Y.K. Kwok, “A Game Theoretic Approach toPower Aware Wireless Data Access,” IEEE Trans. Mobile Computing, vol. 5, no. 8, pp. 10571073, Aug. 2006.
[11] R.S. Komali and A.B. MacKenzie, “Distributed Topology Control in AdHoc Networks: A Game Theoretic Perspective,” Proc. ThirdIEEE Consumer Comm. and Networking Conf. (CCNC '06), vol. 1, pp.563568, Jan. 2006.
[12] P. Santi, S. Eidenbenz, and G. Resta, “A Framework for Incentive Compatible Topology Control in NonCooperative Wireless MultiHop Networks,” Proc. Workshop Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS), 2006.
[13] D. Monderer and L. Shapley, “Potential Games,” Games and Economic Behavior, vol. 14, pp. 124143, 1996.
[14] D. Fudenberg and J. Tirole, Game Theory. MIT Press, 1991.
[15] J.W. Friedman and C. Mezzetti, “Learning in Games by Random Sampling,” J. Economic Theory, vol. 98, pp. 5584, 2001.
[16] S. Narayanaswamy, V. Kawadia, R.S. Sreenivas, and P.R. Kumar, “Power Control in AdHoc Networks: Theory, Architecture, Algorithm and Implementation of the COMPOW Protocol,” Proc. European Wireless 2002, Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, pp. 156162, Feb. 2002.
[17] R.W. Thomas, R.S. Komali, A.B. MacKenzie, and L. DaSilva, “Joint Power and Channel Minimization in Topology Control: A Cognitive Network Approach,” Proc. ICC CogNet Workshop, 2007.
[18] C. Bettstetter, “On the Minimum Node Degree and Connectivity of a Wireless Multihop Network,” Proc. ACM MobiHoc '02, pp.8091, June 2002.
[19] L.A. DaSilva and V. Srivastava, “Node Participation in AdHoc and PeertoPeer Networks: A GameTheoretic Formulation,” Proc. Workshop Games and Emergent Behavior in Distributed Computing Environments, Sept. 2004.
[20] V. Srinivasan, P. Nuggehalli, C. Chiasserini, and R. Rao, “Cooperation in Wireless Ad Hoc Networks,” Proc. IEEE INFOCOM '03, Mar. 2003.
[21] M. Felegyhazi, J.P. Hubaux, and L. Buttyan, “Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 5, May 2006.
[22] N. Ben Salem, L. Buttyan, J.P. Hubaux, and M. Jakobsson, “Node Cooperation in Hybrid Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 4, Apr. 2006.
[23] M. Pearlman, J. Deng, B. Liang, and Z. Haas, “Elective Participation in Ad Hoc Networks Based on Energy Consumption,” Proc. IEEE Global Telecommunications Conf. (GLOBECOM), 2002.
[24] A. Clementi, P. Penna, and R. Silvestri, “Hardness Results for the Power Range Assignment Problem in Packet Radio Networks,” Proc. Third Int'l Workshop Randomization and Approximation in Computer Science (APPROX '99), vol. 1671, pp. 195208, July 1999.
[25] R.S. Komali, R.W. Thomas, L. DaSilva, and A.B. MacKenzie, Selfishness and Knowledge in Dynamic Topology Control: A Cognitive Network Approach, Aug. 2007.
[26] V. Srivastava, J. Neel, A. MacKenzie, R. Menon, J. Hicks, L. DaSilva, J. Reed, and R. Gilles, “Using Game Theory to Analyze Wireless Ad Hoc Networks,” IEEE Comm. Surveys and Tutorials, Fourth Quarter 2005.
[27] S. Eidenbenz, V. Kumar, and S. Zust, “Equilibria in Topology Control Games for Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, vol. 11, no. 2, pp. 143159, 2006.
[28] S. Yuen and B. Li, “Strategyproof Mechanisms towards EvolutionaryTopology Formation in Autonomous Networks,” ACM/Kluwer Mobile Networks and Applications, special issue on noncooperative wireless networking and computing, Oct. 2005.