{"id":"https://openalex.org/W2132265787","doi":"https://doi.org/10.1109/gamenets.2009.5137387","title":"Reliable relaying with uncertain knowledge","display_name":"Reliable relaying with uncertain knowledge","publication_year":2009,"publication_date":"2009-05-01","ids":{"openalex":"https://openalex.org/W2132265787","doi":"https://doi.org/10.1109/gamenets.2009.5137387","mag":"2132265787"},"language":"en","primary_location":{"id":"doi:10.1109/gamenets.2009.5137387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gamenets.2009.5137387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Game Theory for Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100640468","display_name":"Jiwoong Lee","orcid":"https://orcid.org/0000-0001-6177-4569"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiwoong Lee","raw_affiliation_strings":["Department of Electrical Engineering and Computer Sciences, University of California Berkeley, Berkeley, CA, USA","Dept. of Electrical Engineering & Computer Sciences, University of California at Berkeley, 94720, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Sciences, University of California Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"Dept. of Electrical Engineering & Computer Sciences, University of California at Berkeley, 94720, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041937901","display_name":"Jean Walrand","orcid":"https://orcid.org/0000-0002-1460-6826"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jean Walrand","raw_affiliation_strings":["Department of Electrical Engineering and Computer Sciences, University of California Berkeley, Berkeley, CA, USA","Dept. of Electrical Engineering & Computer Sciences, University of California at Berkeley, 94720, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Sciences, University of California Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"Dept. of Electrical Engineering & Computer Sciences, University of California at Berkeley, 94720, USA","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100640468"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":0.3625,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66592133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"82","last_page":"87"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11031","display_name":"Game Theory and Applications","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12288","display_name":"Optimization and Search Problems","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/impossibility","display_name":"Impossibility","score":0.7871440649032593},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7496657371520996},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6974322199821472},{"id":"https://openalex.org/keywords/simplicity","display_name":"Simplicity","score":0.6424999237060547},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5765272974967957},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5715494155883789},{"id":"https://openalex.org/keywords/common-knowledge","display_name":"Common knowledge (logic)","score":0.5398567914962769},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5191682577133179},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38558655977249146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2512931823730469},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1557917296886444}],"concepts":[{"id":"https://openalex.org/C2776261394","wikidata":"https://www.wikidata.org/wiki/Q315562","display_name":"Impossibility","level":2,"score":0.7871440649032593},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7496657371520996},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6974322199821472},{"id":"https://openalex.org/C2776372474","wikidata":"https://www.wikidata.org/wiki/Q508291","display_name":"Simplicity","level":2,"score":0.6424999237060547},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5765272974967957},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5715494155883789},{"id":"https://openalex.org/C31084985","wikidata":"https://www.wikidata.org/wiki/Q372650","display_name":"Common knowledge (logic)","level":5,"score":0.5398567914962769},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5191682577133179},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38558655977249146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2512931823730469},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1557917296886444},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C107247716","wikidata":"https://www.wikidata.org/wiki/Q1347436","display_name":"Epistemic modal logic","level":4,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C102993220","wikidata":"https://www.wikidata.org/wiki/Q387196","display_name":"Description logic","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C203659156","wikidata":"https://www.wikidata.org/wiki/Q6934805","display_name":"Multimodal logic","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/gamenets.2009.5137387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gamenets.2009.5137387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Game Theory for Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.330.8572","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.8572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://robotics.eecs.berkeley.edu/~wlr/MURI/ReliableRelaying.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.420.5453","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.420.5453","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://robotics.eecs.berkeley.edu/~wlr/Papers/ReliableRelaying.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1506769828","https://openalex.org/W1989957694","https://openalex.org/W2070603970","https://openalex.org/W2084316739","https://openalex.org/W2106622011","https://openalex.org/W2106887953","https://openalex.org/W2613173048","https://openalex.org/W3122177367","https://openalex.org/W3122615238","https://openalex.org/W3137092842"],"related_works":["https://openalex.org/W2368019753","https://openalex.org/W2384156839","https://openalex.org/W2333930193","https://openalex.org/W2737356002","https://openalex.org/W2246241526","https://openalex.org/W4321602641","https://openalex.org/W4301122218","https://openalex.org/W2374150061","https://openalex.org/W2081340182","https://openalex.org/W4210752643"],"abstract_inverted_index":{"The":[0,20,27,44,88,125],"motivation":[1],"for":[2],"this":[3,109],"paper":[4,21,93,126],"is":[5,29,52,56,95,151],"to":[6,83,112],"analyze":[7],"the":[8,14,34,54,73,92,96,136],"effect":[9],"of":[10,18,25,63,75,85,98,116,118,138],"information":[11,55,67],"uncertainty":[12],"on":[13],"design":[15],"and":[16,79,131],"performance":[17],"protocols.":[19],"considers":[22],"two":[23,128],"types":[24],"situations.":[26],"first":[28],"when":[30,53],"different":[31],"nodes":[32,42,80],"in":[33,70,100,123,135,149],"network":[35],"have":[36],"bounded":[37,64],"knowledge":[38,48,120,150],"about":[39,49],"what":[40],"other":[41],"know.":[43],"second,":[45],"called":[46],"common":[47],"inconsistent":[50,57,66],"beliefs,":[51],"but":[58],"everyone":[59],"knows":[60],"it.":[61],"Situations":[62],"or":[65],"arise":[68,122],"naturally":[69],"networks":[71],"because":[72],"state":[74],"these":[76],"systems":[77],"changes":[78],"take":[81],"time":[82],"learn":[84],"those":[86],"changes.":[87],"specific":[89],"problem":[90,110],"that":[91,121,142],"explores":[94],"relaying":[97],"packets":[99],"a":[101,140],"simple":[102],"butterfly":[103],"network.":[104],"Despite":[105],"its":[106],"apparent":[107],"simplicity,":[108],"enables":[111,143],"illustrate":[113],"key":[114],"features":[115],"situations":[117],"uncertain":[119],"networks.":[124],"presents":[127],"impossibility":[129],"facts":[130],"one":[132],"possibility":[133],"fact,":[134],"latter":[137],"which":[139],"scheme":[141],"optimal":[144],"coordination":[145],"given":[146],"persisting":[147],"imperfection":[148],"introduced.":[152]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
