{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:36:45Z","timestamp":1725669405549},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/ipdps.2007.370435","type":"proceedings-article","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T10:41:07Z","timestamp":1182336067000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm"],"prefix":"10.1109","author":[{"given":"Marcin","family":"Seredynski","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Bouvry","sequence":"additional","affiliation":[]},{"given":"Mieczyslaw A.","family":"Klopotek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ad Hoc Networking","year":"2001","key":"13"},{"key":"11","article-title":"Simulation-based analysis of security exposures in mobile ad hoc networks","author":"michiardi","year":"2002","journal-title":"Proc European Wireless Conference"},{"key":"12","first-page":"2637","article-title":"Evolution of cooperative behavior in the iterated prisoner's dilemma under random pairing in game playing","author":"namikawa","year":"2005","journal-title":"Proc IEEE Congress Evolutionary Computation (CEC '05)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"1","first-page":"131","article-title":"The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks","author":"buchegger","year":"2000","journal-title":"Proc Workshop on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks (WiOpt'03)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"article-title":"Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks","year":"2001","author":"buttyan","key":"7"},{"journal-title":"Mobile Computing Handbook","year":"2005","key":"6"},{"journal-title":"Mobile Ad Hoc Networking","year":"2004","author":"giordano","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916651"},{"key":"9","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proc ACM\/IEEE 6th International Conference on Mobile Computing and Networking (MobiCom'OO)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"}],"event":{"name":"2007 IEEE International Parallel and Distributed Processing Symposium","start":{"date-parts":[[2007,3,26]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2007,3,30]]}},"container-title":["2007 IEEE International Parallel and Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4203121\/4227918\/04228163.pdf?arnumber=4228163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T01:55:00Z","timestamp":1587606900000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4228163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2007.370435","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}