Results 1 - 10
of
1,006
On selfish behavior in CSMA/CA networks
- In Proc. of IEEE Infocom
, 2005
"... Abstract — CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes would play by the rules. This can be dangerous, since the nodes themselves control their random deferment. Indeed, with the higher pro ..."
Abstract
-
Cited by 61 (7 self)
- Add to MetaCart
programmability of the network adapters, the temptation to tamper with the software or firmware is likely to grow; by doing so, a user could obtain a much larger share of the available bandwidth at the expense of other users. We use a game-theoretic approach to investigate the problem of the selfish behavior
SELFISH BEHAVIOR IN NETWORK-BASED GAMES
, 2006
"... It is a well known pricinple of economics that when members of society do not coordinate and instead act independently in a self-interested fashion, the resulting outcome typically does not achieve the maximum possible total social welfare. Thus, there is often a cost to competitive behavior. This p ..."
Abstract
- Add to MetaCart
. This phenomenon, often refered to as the “Tragedy of the Commons”, can explain the underlying cause of many diverse problems, including industrial over-pollution, nuclear proliferation, and over-fishing. In all these settings, decentralized and selfish behavior leads to suboptiml outcomes in which all parties
Equilibria and Selfish Behavior in Peer Matching
"... Peer to peer networks are distributed data-sharing systems without a centralized infrastructure. ..."
Abstract
- Add to MetaCart
Peer to peer networks are distributed data-sharing systems without a centralized infrastructure.
Thwarting Selfish Behavior in 802.11 WLANs
"... Abstract—The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper we propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is ..."
Abstract
- Add to MetaCart
Abstract—The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper we propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm
Detecting Selfish Behavior in a Cooperative Commons Abstract
"... A cooperative commons is a type of ad hoc network in which all devices are required to communicate and carry each other’s traffic, even when devices are associated with different administrative domains. Thus, infrastructure is constructed at little cost to each owner. One unusual feature of the coop ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
of the cooperative commons is that as more devices join, total communication capacity increases. These advantages are possible when devices are willing to cooperate and use their own resources to carry traffic of others, but are undermined by selfish behavior, where a device’s actions increases benefit
1 Detecting Selfish Behavior in a Cooperative Commons
"... A cooperative commons is a type of ad hoc network in which all devices are required to communicate and carry each other’s traffic, even when devices are associated with different administrative domains. Thus, infrastructure is constructed at little cost to each owner. One unusual feature of the coop ..."
Abstract
- Add to MetaCart
of the cooperative commons is that as more devices join, total communication capacity increases. These advantages are possible when devices are willing to cooperate and use their own resources to carry traffic of others, but are undermined by selfish behavior, where a device’s actions increases benefit
A Learning Perspective on Selfish Behavior in Games
, 2009
"... Computer systems increasingly involve the interaction of multiple self-interested agents. The designers of these systems have objectives they wish to optimize, but by allowing selfish agents to interact in the system, they lose the ability to directly control behavior. What is lost by this lack of ..."
Abstract
- Add to MetaCart
Computer systems increasingly involve the interaction of multiple self-interested agents. The designers of these systems have objectives they wish to optimize, but by allowing selfish agents to interact in the system, they lose the ability to directly control behavior. What is lost by this lack
The price of selfish behavior in bilateral network formation
- In Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
, 2005
"... Given a collection of selfish agents who wish to establish links to route traffic among themselves, the set of equilibrium network topologies may appear quite different from the centrally enforced optimum. We study the quality (price of anarchy) of equilib-rium networks in a game where links require ..."
Abstract
-
Cited by 75 (0 self)
- Add to MetaCart
Given a collection of selfish agents who wish to establish links to route traffic among themselves, the set of equilibrium network topologies may appear quite different from the centrally enforced optimum. We study the quality (price of anarchy) of equilib-rium networks in a game where links
The Good, the Bad, and the Talented: Entrepreneurial Talent and Selfish Behavior
, 2010
"... Talent allocation models assume that entrepreneurially talented people are selfish and thus allocate into unproductive or even destructive activities if these offer the highest private returns. This paper experimentally analyzes selfish preferences of the entrepreneurially talented. We find that mak ..."
Abstract
- Add to MetaCart
that making a distinction between creative talent and business talent explains systematic differences in selfish behavior. Generally, both the less business talented and the more creative are more willing to forego private payoffs to avoid losses to others. A moderator analysis reveals that less creative
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks
"... are routed in a mobility-assisted manner. Therefore, the willingness of nodes to relay messages for other nodes plays a significant role in the routing process. Moreover, since the resources in mobile devices are generally limited, carriers of mobile devices may be unwilling to relay messages for ot ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
for other nodes in order to conserve their scarce resources. Furthermore, recent studies on the impact of selfish behavior in DTNs show that the performance metrics (i.e., delivery ratio, delivery overhead, and delivery latency) are severely influenced if a major portion of the nodes is selfish. A number
Results 1 - 10
of
1,006