Citation: | Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397. |
[1] | Shi Jianzhi, Wang Xingwei, Yi Bo. Analysis Method of the JointCloud Resource Market: A Game-Theoretic Approach[J]. Journal of Computer Research and Development, 2023, 60(9): 1988-1999. DOI: 10.7544/issn1000-1239.202330411 |
[2] | Sun Yan, Ji Weifeng, Weng Jiang, Zhao Beiying. Optimal Strategy of Moving Target Defense Based on Differential Game[J]. Journal of Computer Research and Development, 2021, 58(8): 1789-1800. DOI: 10.7544/issn1000-1239.2021.20200524 |
[3] | Yu Yaxin, Wang Lei. An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311. DOI: 10.7544/issn1000-1239.2019.20180068 |
[4] | Meng Fei, Lan Julong, Hu Yuxiang. A Cooperative Game Based Data Center Backbone Network Bandwidth Allocation Policy[J]. Journal of Computer Research and Development, 2016, 53(6): 1306-1313. DOI: 10.7544/issn1000-1239.2016.20148400 |
[5] | Wang Xiaoyan, Chen Jinchuan, Guo Xiaoyan, Du Xiaoyong. A Nash-Pareto Strategy Based Automatic Data Distribution Method and Its Supporting Tool[J]. Journal of Computer Research and Development, 2015, 52(9): 1965-1975. DOI: 10.7544/issn1000-1239.2015.20140832 |
[6] | He Yunhua, Sun Limin, Yang Weidong, Li Zhi, Li Hong. Privacy Preserving for Node Trajectory in VSN: A Game-Theoretic Analysis Based Approach[J]. Journal of Computer Research and Development, 2014, 51(11): 2483-2492. DOI: 10.7544/issn1000-1239.2014.20131074 |
[7] | Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352. |
[8] | Huang Tingpei, Chen Haiming, Zhang Zhaoliang, Cui Li. Variable-Width Channel Allocation Based on Game Theory in 802.11 Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2059-2069. |
[9] | Wang Bo, Huang Chuanhe, Yang Wenzhong, Dan Feng, and Xu Liya. An Incentive-Cooperative Forwarding Model Based on Punishment Mechanism in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 398-406. |
[10] | Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316. |