{"title":"自私网络中的K-anycast游戏","authors":"Weizhao Wang, Xiangyang Li, O. Frieder","doi":"10.1109/ICCCN.2004.1401650","DOIUrl":null,"url":null,"abstract":"Conventionally, the majority of network routing protocols assume that every network terminal or link forwards data for others without any deviation. However, this may not be true when the terminals or links are owned by individual selfish users, who always tries to maximize their own benefits instead of faithfully following a prescribed protocol. In this paper, we propose a new routing protocol, called k-anycast routing, that works well even if network links (or terminals or both) are selfish. In our protocol, the source node first finds a tree that spans k receivers out of a set of possible receivers and pay the relay links to compensate their costs. We prove that every relay link follows the routing protocol: it maximizes its profit when it declares its actual cost","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"k-anycast game in selfish networks\",\"authors\":\"Weizhao Wang, Xiangyang Li, O. Frieder\",\"doi\":\"10.1109/ICCCN.2004.1401650\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Conventionally, the majority of network routing protocols assume that every network terminal or link forwards data for others without any deviation. However, this may not be true when the terminals or links are owned by individual selfish users, who always tries to maximize their own benefits instead of faithfully following a prescribed protocol. In this paper, we propose a new routing protocol, called k-anycast routing, that works well even if network links (or terminals or both) are selfish. In our protocol, the source node first finds a tree that spans k receivers out of a set of possible receivers and pay the relay links to compensate their costs. We prove that every relay link follows the routing protocol: it maximizes its profit when it declares its actual cost\",\"PeriodicalId\":229045,\"journal\":{\"name\":\"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2004.1401650\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2004.1401650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Conventionally, the majority of network routing protocols assume that every network terminal or link forwards data for others without any deviation. However, this may not be true when the terminals or links are owned by individual selfish users, who always tries to maximize their own benefits instead of faithfully following a prescribed protocol. In this paper, we propose a new routing protocol, called k-anycast routing, that works well even if network links (or terminals or both) are selfish. In our protocol, the source node first finds a tree that spans k receivers out of a set of possible receivers and pay the relay links to compensate their costs. We prove that every relay link follows the routing protocol: it maximizes its profit when it declares its actual cost