SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | José Alberto Fernández-Zepeda, Daniel Brubeck-Salcedo, Daniel Fajardo-Delgado, Héctor Zatarain-Aceves. A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem[J]. Journal of Computer Science and Technology, 2018, 33(4): 823-837. DOI: 10.1007/s11390-018-1858-8 |
[1] |
Tanenbaum A S, van Steen M. Distributed Systems:Principles and Paradigms (2nd edition). Prentice-Hall, Inc., 2006.
|
[2] |
Nisan N, Roughgarden T, Tardos E, Vazirani V V. Algo?ithmic Game Theory. Cambridge University Press, 2007.
|
[3] |
Halpern J Y. Beyond Nash equilibrium:Solution concepts for the 21st century. In Proc. the 27th ACM Symp. Principles of Distributed Computing, August 2008.
|
[4] |
Manshaei M H, Zhu Q Y, Alpcan T, Baçsar T, Hubaux J P. Game theory meets network security and privacy. ACM Computing Surveys, 2013, 45(3):Article No. 25.
|
[5] |
Feldman M, Lai K, Stoica I, Chuang J. Robust incentive techniques for peer-to-peer networks. In Proc. the 5th ACM Conf. Electronic Commerce, May 2004, pp.102-111.
|
[6] |
Feldman M, Papadimitriou C, Chuang J, Stoica I. Freeriding and whitewashing in peer-to-peer systems. IEEE Journal on Selected Areas in Communications, 2006, 24(5):1010-1019.
|
[7] |
Roughgarden T. Selfish Routing and the Price of Anarchy. The MIT Press, 2005.
|
[8] |
Koutsoupias E, Papadimitriou C. Worst-case equilibria. Computer Science Review, 2009, 3(2):65-69.
|
[9] |
von Neumann J, Morgenstern O. Theory of Games and Economic Behavior. Princeton University Press, 2007.
|
[10] |
Fajardo-Delgado D, Fernández-Zepeda J A, Bourgeois A G. The bodyguard allocation problem. IEEE Trans. Parallel and Distributed Systems, 2013, 24(7):1465-1478.
|
[11] |
Nash J F Jr. Equilibrium points in n-person games. Proceedings of the National Academy of Sciences of the United States of America, 1950, 36(1):48-49.
|
[12] |
Dasgupta A, Ghosh S, Tixeuil S. Selfish stabilization. In Stabilization, Safety, and Security of Distributed Systems, Datta A K, Datta M (eds.), Springer, 2006, pp.231-243.
|
[13] |
Cohen J, Dasgupta A, Ghosh S, Tixeuil S. An exercise in selfish stabilization. ACM Trans. Autonomous and Adaptive Systems, 2008, 3(4):Article No. 15.
|
[14] |
Zatarain-Aceves H, Fernández-Zepeda J A, Brizuela C A, Fajardo-Delgado D. A cascade evolutionary algorithm for the bodyguard allocation problem. Applied Soft Computing, 2015, 37:643-651.
|
[15] |
Raidl G R, Julstrom B A. Edge sets:An effective evolutionary coding of spanning trees. IEEE Trans. Evolutionary Computation, 2003, 7(3):225-239.
|
[16] |
Barabási A L, Albert R. Emergence of scaling in random networks. Science, 1999, 286(5439):509-512.
|
[17] |
Erdös P, Rényi A. On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci., 1960, 5:17-61.
|
[18] |
Kumar R, Raghavan P, Rajagopalan S, Sivakumar D, Tomkins A, Upfal E. Stochastic models for the web graph. In Proc. the 41st Annual Symp. Foundations of Computer Science, November 2000, pp.57-65.
|
[19] |
Schulz A S, Moses N S. On the performance of user equilibria in traffic networks. In Proc. the 14th Annual ACMSIAM Symp. Discrete Algorithms, January 2003, pp.86-87.
|
[20] |
Anshelevich E, Dasgupta A, Kleinberg J, Tardos E, Wexler T, Roughgarden T. The price of stability for network design with fair cost allocation. In Proc. the 45th Annual IEEE Symp. Foundations of Computer Science, October 2004, pp.295-304.
|
[21] |
Blum C, Roli A. Metaheuristics in combinatorial optimization:Overview and conceptual comparison. ACM Computing Surveys, 2003, 35(3):268-308.
|
[22] |
Eiben A E, Jelasity M. A critical note on experimental research methodology in EC. In Proc. Congress on Evolutionary Computation, May 2002, pp.582-587.
|
[23] |
Crepinšek M, Liu S H, Mernik M. Replication and compa?ison of computational experiments in applied evolutionary computing:Common pitfalls and guidelines to avoid them. Applied Soft Computing, 2014, 19:161-170.
|
[24] |
Lilliefors H W. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. Journal of the American Statistical Association, 1967, 62(318):399-402.
|
[25] |
Conover W J. Practical Nonparametric Statistics. Wiley Series in Probability and Statistics, John Wiley & Sons, 1980.
|
[1] | En Wang, Han Wang, Peng-Min Dong, Yuan-Bo Xu, Yong-Jian Yang. Distributed Game-Theoretical D2D-Enabled Task Offloading in Mobile Edge Computing[J]. Journal of Computer Science and Technology, 2022, 37(4): 919-941. DOI: 10.1007/s11390-022-2063-3 |
[2] | Yang Liu, Guo-Fu Zhang, Zhao-Pin Su, Feng Yue, Jian-Guo Jiang. Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games[J]. Journal of Computer Science and Technology, 2016, 31(6): 1136-1150. DOI: 10.1007/s11390-016-1688-5 |
[3] | Pin-Yan Lu, Chang-Yuan Yu. Worst-Case Nash Equilibria in Restricted Routing[J]. Journal of Computer Science and Technology, 2012, 27(4): 710-717. DOI: 10.1007/s11390-012-1257-5 |
[4] | Ya-Feng Wu, Yin-Long Xu, Guo-Liang Chen. Approximation Algorithms for Steiner Connected Dominating Set[J]. Journal of Computer Science and Technology, 2005, 20(5): 713-716. |
[5] | WAN Yingyu, XU Yinlong, GU Xiaodong, CHEN Guoliang. Efficient Minimum Spanning Tree Algorithms on the Reconfigurable Mesh[J]. Journal of Computer Science and Technology, 2000, 15(2): 116-125. |
[6] | Ma Jun, Ma Shaohan. An O(k~2n~2) Algorithm to Find a k-Partition in a k-Connected Graph[J]. Journal of Computer Science and Technology, 1994, 9(1): 86-91. |
[7] | Ma Jun, Ma Shaohan. Efficient Parallel Algorithms for Some Graph Theory Problems[J]. Journal of Computer Science and Technology, 1993, 8(4): 76-80. |
[8] | Li Tianzhu. A Study of Optimization and Rule/Goal Graph for a Logical Query[J]. Journal of Computer Science and Technology, 1992, 7(4): 356-362. |
[9] | Chen Fang, Shi Baile. A Conservative Multiversion Locking-Graph Scheduler Algorithm[J]. Journal of Computer Science and Technology, 1991, 6(2): 161-166. |
[10] | Li Hao, Liu Qun. A Problem of Tree Graph[J]. Journal of Computer Science and Technology, 1989, 4(1): 61-66. |