[1] RESTA G, SANTI P. A framework for routing performance analysis in delay tolerant networks with application to non-cooperative networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(1): 2-10. [2] SHEVADE U, SONG H H, QIU V L, et al. Incentive-aware routing in DTN[C]//ICNP 2008: Proceedings of the 2008 IEEE International Conference on Network Protocols, Piscataway: IEEE, 2008: 238-247. [3] SHARMA A. A credit based routing mechanism to contrast selfish nodes in delay tolerant networks[C]//PDGC 2014: Proceedings of the 2014 IEEE International Conference on Parallel, Distributed and Grid Computing. Piscataway: IEEE, 2014: 295-300. [4] MICHIARDI P, MOLVA R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks[C]//Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security. Deventer, The Netherlands: Kluwer, 2002: 107-121. [5] 张磊,张希,安成锦,等.基于信誉的延迟容忍网络激励方案[J].电子学报,2014,42(9):1738-1743. (ZHANG L, ZHANG X, AN C J, et al. A reputation-based incentive scheme for delay tolerant networks[J]. Acta Electronica Sinica, 2014, 42(9): 1738-1743.) [6] 张沙沙,张冬雯,张光华.一种机会网络中的节点激励机制[J].微电子与计算机,2015,32(7):78-82. (ZHANG S S, ZHANG D W, ZHANG G H. A incentive mechanism of node in opportunistic network[J]. Microelectronics and Computer, 2015, 32(7): 78-82.) [7] 李云,于季弘,尤肖虎.资源受限的机会网络节点激励策略研究[J].计算机学报,2013,36(5):947-956. (LI Y, YU J H, YOU X H. An incentive protocol for opportunistic networks with resource constraint[J]. Chinese Journal of Computers, 2013, 36(5): 947-956.) [8] VINCENT T L. An evolutionary game theory for differential equation models with reference to ecosystem management[M]//Advances in Dynamic Games and Applications: Volume 1 of the Series Annals of the International Society of Dynamic Games. Boston: Birkhäuser, 1994, 1: 356-374. [9] LIU Y K, ZHANG L, CHEN X J, et al. Cautious strategy update promotes cooperation in spatial prisoner's dilemma game[J]. Physica A: Statistical Mechanics and Its Applications, 2013, 392(17): 3640-3647. [10] LI Y, LAN X, DENG X Y, et al. Comprehensive consideration of strategy updating promotes cooperation in the prisoner's dilemma game[J]. Physica A: Statistical Mechanics and Its Applications, 2014, 403: 284-292. [11] SHIVSHANKAR S, JAMALIPOUR A. An evolutionary game theory-based approach to cooperation in VANETs under different network conditions[J]. IEEE Transactions on Vehicular Technology, 2015, 64(5): 2015-2022. [12] GRASIC S, DAVIES E, LINDGREN A, et al. The evolution of a DTN routing protocol — PRoPHETv2[C]//Proceedings of the 6th ACM Workshop on Challenged Network. New York: ACM, 2011: 27-30. [13] EAGLE N, PENTLAND A. Reality mining: sensing complex social systems[J]. Personal and Ubiquitous Computing, 2006, 10(4): 255-268. [14] SCOTT J, GASS R, CROWCROFT J, et al. CRAWDAD: a community resource for archiving wireless data at Dartmouth [EB/OL]. (2009-05-29) [2015-03-16]. http://crawdad.org/cambridge/haggle/20090529. [15] TOUMOUX P U, LEGUAY J, BENBADIS F, et al. The accordion phenomenon: analysis, characterization, and impact on DTN routing[C]//Proceedings of the INFOCOM 2009. Piscataway: IEEE, 2009: 1116-1124. [16] LU Z Q, WEN Y G, CAO G H. Community detection in weighted networks: algorithms and applications[C]//PerCom 2013: Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications. Washington, DC: IEEE Computer Society, 2013: 179-184. [17] REN Z, ZHANG A, WEN C, et al. A scatter learning particle swarm optimization algorithm for multimodal problems[J]. IEEE Transactions on Cybernetics, 2014, 44(7): 1127-1140. [18] REN G, WANG X. Robustness of cooperation in memory-based prisoner's dilemma game on a square lattice[J]. Physica A: Statistical Mechanics and Its Applications, 2014, 408: 40-46. [19] KERÄNEN A, OTT J, KÄRKKÄINEN T. The ONE simulator for DTN protocol evaluation[C]//Simutools '09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques. Brussels, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009: Article No. 55. |