{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T15:06:30Z","timestamp":1648911990762},"reference-count":18,"publisher":"Oxford University Press (OUP)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Logic and Computation"],"published-print":{"date-parts":[[2015,6,1]]},"DOI":"10.1093\/logcom\/exu021","type":"journal-article","created":{"date-parts":[[2014,5,12]],"date-time":"2014-05-12T20:29:57Z","timestamp":1399926597000},"page":"639-667","source":"Crossref","is-referenced-by-count":1,"title":["A game-theoretic approach to compute stable topologies in mobile ad hoc networks"],"prefix":"10.1093","volume":"25","author":[{"given":"N.","family":"Bulling","sequence":"first","affiliation":[]},{"given":"M.","family":"Popovici","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2014,5,12]]},"reference":[{"key":"3_47865924","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1016\/j.future.2011.04.006","volume":"27","year":"2011","journal-title":"FUTURE GENERATION COMPUTER SYSTEMS"},{"key":"4_47865925","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/978-3-642-32897-8_10","volume":"7486","year":"2012","journal-title":"COMPUTATIONAL LOGIC IN MULTIAGENT SYSTEMS LECTURE NOTES IN COMPUTER SCIENCE"},{"key":"6_46417821","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1023\/A:1025146013151","volume":"8","year":"2003","journal-title":"MOBILE NETWORKS AND APPLICATIONS"},{"key":"7_47865926","doi-asserted-by":"crossref","first-page":"3421","DOI":"10.1016\/j.comnet.2010.06.020","volume":"54","year":"2010","journal-title":"COMPUTER NETWORKS"},{"key":"8_47865927","first-page":"52","volume":"131","year":"1981","journal-title":"PROCEEDINGS OF LOGICS OF PROGRAMS WORKSHOP"},{"key":"9_47865928","first-page":"2","volume":"7","year":"2005","journal-title":"IEEE COMMUNICATIONS SURVEYS AND TUTORIALS"},{"key":"10_47865929","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.geb.2008.04.011","volume":"66","year":"2009","journal-title":"GAMES AND ECONOMIC BEHAVIOR"},{"key":"12_47865930","first-page":"176","volume":"6295","year":"2011","journal-title":"ADVANCES IN DATABASES AND INFORMATION SYSTEMS"},{"key":"13_47865931","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1109\/TMC.2006.68","volume":"5","year":"2006","journal-title":"IEEE TRANSACTIONS ON MOBILE COMPUTING"},{"key":"14_47865932","first-page":"248","volume":"4","year":"2000","journal-title":"ERICSSON REVIEW"},{"key":"17_47865933","doi-asserted-by":"crossref","first-page":"3108","DOI":"10.1109\/TVT.2008.917225","volume":"57","year":"2008","journal-title":"IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY"},{"key":"19_47865934","first-page":"28","volume":"2","year":"2004","journal-title":"IEEE SECURITY AND PRIVACY"},{"key":"25_47865935","first-page":"134","volume":"44","year":"2006","journal-title":"IEEE COMMUNICATIONS MAGAZINE"},{"key":"26_47865936","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/506147.506153","volume":"49","year":"2002","journal-title":"JOURNAL OF ACM"},{"key":"27_27380397","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/98.760423","volume":"6","year":"1999","journal-title":"IEEE PERSONAL COMMUNICATIONS"},{"key":"28_47865937","first-page":"46","volume":"7","year":"2005","journal-title":"COMMUNICATIONS SURVEYS TUTORIALS IEEE"},{"key":"30_47865938","first-page":"1987","volume":"3","year":"2003","journal-title":"INFOCOM TWENTYSECOND ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND COMMUNICATIONS IEEE SOCIETIES"},{"key":"31_47865939","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1007\/s11276-006-9855-1","volume":"13","year":"2007","journal-title":"WIRELESS NETWORKS"}],"container-title":["Journal of Logic and Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/logcom\/article-pdf\/25\/3\/639\/6139197\/exu021.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T13:56:19Z","timestamp":1503496579000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/logcom\/article-lookup\/doi\/10.1093\/logcom\/exu021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,12]]},"references-count":18,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,5,27]]},"published-print":{"date-parts":[[2015,6,1]]}},"URL":"https:\/\/doi.org\/10.1093\/logcom\/exu021","relation":{},"ISSN":["0955-792X","1465-363X"],"issn-type":[{"value":"0955-792X","type":"print"},{"value":"1465-363X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,12]]}}}