[1] BUTTYAN L, HUBAUX J P. Enforcing service availability in mobile ad-hoc WANs[C]// Proceedings of the 1st ACM International Symposium on Mobile ad hoc Networking & Computing. Piscataway:IEEE Press,2000: 87-96.
[2]
[2] BUCHEGGER S, LE BOUDEC J Y. Performance analysis of the confidant protocol[C]// Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking & Computing. New York: ACM Press, 2002: 226–236.
[3]
[3] MOLANDER P. The optimal level of generosity in selfish, uncertain environment[J]. Journal of Conflict Resolution, 1985, 29: 611-618.
[4]
[4] NOWAK M, SIGMUND K. Tit for tat in heterogeneous populations[J]. Nature, 1992, 355:250-253.
[5]
[5] MAILATH G J, SAMUELSON L. Repeated Games and Reputations [M]. Oxford: Oxford University Press, 2006.
[6]
[6] BEAUFILS B, DELAHAYE J P, MATHIEU P. Our meeting with gradual, a good strategy for the iterated prisoner’s dilemma[C]// Artificial Life V: Proceedings of The Fifth International Workshop on the Synthesis and Simulation of Living Systems. Nara: MIT Press. 1996.