A Network Formation Game Approach to Study BitTorrent Tit-for-Tat, NetgCoop, 2007. ,
DOI : 10.1007/978-3-540-72709-5_2
The price of selfish behavior in bilateral network formation, Proceedings of the twenty-fourth annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing , PODC '05, pp.99-107, 2005. ,
DOI : 10.1145/1073814.1073833
Characterizing selfishly constructed overlay routing networks, INFOCOM, pp.1329-1339, 2004. ,
Multihoming of Users to Access Points in WLANs: A Population Game Perspective, IEEE Journal on Selected Areas in Communications, vol.25, issue.6, pp.1207-1215, 2007. ,
DOI : 10.1109/JSAC.2007.070814
Enabling crowdsourced mobile internet access, INFOCOM, pp.451-459, 2014. ,
Nash equilibria in shared effort games, Proc. of AAMAS, pp.861-868, 2014. ,
How to Optimally allocate your budget of attention in social networks, 2013 Proceedings IEEE INFOCOM, pp.2373-2381, 2013. ,
DOI : 10.1109/INFCOM.2013.6567042
URL : https://hal.archives-ouvertes.fr/hal-00839599
On a network creation game, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.347-351, 2003. ,
DOI : 10.1145/872035.872088
Endogenous Formation of Links Between Players and of Coalitions: an Application of the Shapley Value, 1988. ,
Virus Spread in Networks, IEEE/ACM Transactions on Networking, vol.17, issue.1, pp.1-14, 2009. ,
DOI : 10.1109/TNET.2008.925623
Game Theory: Analysis of Conflict, 1997. ,
On Nash Equilibria for a Network Creation Game, SODA, pp.89-98, 2006. ,
On the topologies formed by selfish peers, Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing , PODC '06, pp.133-142, 2006. ,
DOI : 10.1145/1146381.1146403
Algorithmic Game Theory, 2007. ,
DOI : 10.1017/CBO9780511800481
Topology Design and Control: A Game-Theoretic Perspective, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.1620-1628, 2009. ,
DOI : 10.1109/INFCOM.2009.5062080
Basic Network Creation Games, SIAM Journal on Discrete Mathematics, vol.27, issue.2, pp.656-668, 2013. ,
DOI : 10.1137/090771478
The price of anarchy in network creation games, PODC, pp.292-298, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00359313
A Nash Bargaining Solution for Cooperative Network Formation Games, IFIP Networking, pp.307-318, 2011. ,
DOI : 10.1007/978-3-642-20757-0_24
URL : https://hal.archives-ouvertes.fr/inria-00544527
Coalitional Games for Transmitter Cooperation in MIMO Multiple Access Channels, IEEE Transactions on Signal Processing, vol.62, issue.4, pp.757-771, 2014. ,
DOI : 10.1109/TSP.2013.2290496
Worst-case equilibria, Computer Science Review, vol.3, issue.2, pp.65-69, 2009. ,
DOI : 10.1016/j.cosrev.2009.04.003
The effect of network topology on the spread of epidemics, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1455-1466, 2005. ,
DOI : 10.1109/INFCOM.2005.1498374
Epidemic thresholds in real networks, ACM Transactions on Information and System Security, vol.10, issue.4, pp.1-1, 2008. ,
DOI : 10.1145/1284680.1284681
Detecting sources of computer viruses in networks: Theory and experiment, SIGMETRICS, pp.203-214, 2010. ,
The N-intertwined SIS epidemic network model, Computing, vol.283, issue.4, pp.147-169, 2011. ,
DOI : 10.1007/s00607-011-0155-y
Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks, 52nd IEEE Conference on Decision and Control, pp.7486-7491, 2013. ,
DOI : 10.1109/CDC.2013.6761078
Protecting against network infections: A game theoretic perspective, INFOCOM, pp.1485-1493, 2009. ,
Inoculation strategies for victims of viruses and the sum-of-squares partition problem, Journal of Computer and System Sciences, vol.72, issue.6, pp.1077-1093, 2006. ,
DOI : 10.1016/j.jcss.2006.02.003
Network externalities and the deployment of security features and protocols in the internet, SIGMETRICS, pp.37-48, 2008. ,
Network security and contagion, 2013. ,
Complete game-theoretic characterization of SIS epidemics protection strategies, 53rd IEEE Conference on Decision and Control, pp.1179-1184, 2014. ,
DOI : 10.1109/CDC.2014.7039541
URL : https://hal.archives-ouvertes.fr/hal-01054710
Decentralized Protection Strategies Against SIS Epidemics in Networks, IEEE Transactions on Control of Network Systems, vol.2, issue.4, p.2015 ,
DOI : 10.1109/TCNS.2015.2426755
URL : https://hal.archives-ouvertes.fr/hal-01152459
Existence and Uniqueness of Equilibrium Points for Concave N-Person Games, Econometrica, vol.33, issue.3, pp.520-534, 1965. ,
DOI : 10.2307/1911749
On the eigenvalues of trees, Periodica Mathematica Hungarica, vol.175, issue.1-2, pp.175-182, 1973. ,
DOI : 10.1007/BF02018473