1 |
W. Xu and J. Rexford, "MIRO: Multi-path interdomain routing," ACM SIGCOMM Comput. Commun. Review, vol. 36, no. 4, pp, 171-182, 2006,
DOI
ScienceOn
|
2 |
S. Shelford, G. Shoja, and E. Manning, "Achieving optimal revenues in dynamically priced network services with QoS guarantees," Comput, Netw., vol. 51, no. 11, pp, 3294-3304, 2007.
DOI
ScienceOn
|
3 |
R. D. McKelvey, A. M. McLennan, and T. L. Turocy. (2007). Gambit: Software tools for game theory, Version 0.2007.01.30. [Online]. Available: http://www.gambit-project.org
|
4 |
J. Cowie, A. Ogielski, and D. Nicol. (2002). The SSFNet network simulator. [Online]. Available: http://www.ssfnet.org/homePage.html
|
5 |
B. Premore. (2000). Multi-AS topologies from BGP routing tables. [Online]. Available: http://www.ssfnet.org/Exchange/gallery/asgraph/src.tar.gz
|
6 |
K. Loja, J. Szigeti, and T. Cinkler, "Inter-domain routing in multiprovider optical networks: Game theory and simulations," Next Generation Internet Netw., pp. 157-164, 2005.
|
7 |
L. Li and C. Chen, "Exploring possible strategies for competitions between autonomous systems," in Proc. IEEE ICC, 2008.
|
8 |
Y. Xi and E. Yeh, "Pricing, competition, and routing for selfish and strategic nodes in multi-hop relay networks," in Proc. IEEE INFOCOM, 2008.
|
9 |
R. Cocchi, S. Shenker, D. Estrin, and L. Zhang, "Pricing in computer networks: Motivation, formulation, and example," IEEE/ACM Trans. Netw., vol. 1, no. 6, pp. 614-627, 1993,
DOI
ScienceOn
|
10 |
A. Orda, R. Rom, and N, Shimkin, "Competitive routing in multiuser communication networks," IEEE/ACM Trans. Netw., vol. 1, no. 5, pp. 510-521, 1993,
DOI
ScienceOn
|
11 |
X. Cao, H. Shen, R. Milito, and P. Wirth, "Internet pricing with a game theoretical approach: Concepts and examples," IEEE/ACM Trans. Netw., vol. 10, no. 2, pp. 208-216, 2002.
DOI
ScienceOn
|
12 |
F.-N. Pavlidou and K. Koltsidas, "Game theory for routing modeling in communication networks-a survey," J. Commun. Netw., vol. 10, no. 3, pp. 268-287, 2008.
DOI
|
13 |
R. La and V. Anantharam, "Optimal routing control: Repeated game approach," IEEE Trans. Autom. Control, vol. 47, no. 3, pp. 437-450, 2002,
DOI
ScienceOn
|
14 |
M. Nicholes, "Network security in the core Internet," Ph.D. dissertation, University of California, Davis, 2009,
|
15 |
E. Rasmusen, Games and Information: an Introduction to Game Theory, Basil Blackwell Inc., 1989.
|