메뉴 건너뛰기




Volumn , Issue , 2008, Pages 315-324

Designing mechanisms for reliable internet-based computing

Author keywords

[No Author keywords available]

Indexed keywords

GAME-THEORETIC MODELS; INTERNATIONAL SYMPOSIUM; INTERNET-BASED COMPUTING;

EID: 51749096881     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2008.41     Document Type: Conference Paper
Times cited : (13)

References (28)
  • 1
    • 33748686155 scopus 로고    scopus 로고
    • Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
    • I. Abraham, D. Dolev, R. Goden, and J.Y. Halpern. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In proc. of PODC 2006, pp. 53-62, 2006.
    • (2006) proc. of PODC , pp. 53-62
    • Abraham, I.1    Dolev, D.2    Goden, R.3    Halpern, J.Y.4
  • 2
    • 10444272266 scopus 로고    scopus 로고
    • BOINC: A system for public-resource computing and storage
    • D. Anderson. BOINC: A system for public-resource computing and storage. In proc. of GRID 2004, pp. 4-10, 2004.
    • (2004) proc. of GRID , pp. 4-10
    • Anderson, D.1
  • 4
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • J. R. Douceur. The Sybil attack. In proc. of IPTPS 2002, pp. 251-260, 2002.
    • (2002) proc. of IPTPS , pp. 251-260
    • Douceur, J.R.1
  • 7
    • 38949162207 scopus 로고    scopus 로고
    • Reliably executing tasks in the presence of untrusted processors
    • A. Fernández, C. Georgiou, L. Lopez, and A. Santos. Reliably executing tasks in the presence of untrusted processors. In proc. of SRDS 2006, pp. 39-50, 2006.
    • (2006) proc. of SRDS , pp. 39-50
    • Fernández, A.1    Georgiou, C.2    Lopez, L.3    Santos, A.4
  • 8
    • 85081499050 scopus 로고    scopus 로고
    • Cost-sensitive Mechanisms for Internet-based Computing
    • Technical Report UCY-TR-08-01, Dept. of Computer Science, University of Cyprus, March
    • A. Fernández Anta, C. Georgiou, and M. A. Mosteiro. Cost-sensitive Mechanisms for Internet-based Computing. Technical Report UCY-TR-08-01, Dept. of Computer Science, University of Cyprus, March 2008.
    • (2008)
    • Fernández Anta, A.1    Georgiou, C.2    Mosteiro, M.A.3
  • 9
    • 35248839662 scopus 로고    scopus 로고
    • On death, taxes, and the convergence of P2P and grid computing
    • I.T. Foster and A. Iamnitchi. On death, taxes, and the convergence of P2P and grid computing. In proc. of IPTPS 2003, pp. 118-128, 2003.
    • (2003) proc. of IPTPS , pp. 118-128
    • Foster, I.T.1    Iamnitchi, A.2
  • 10
    • 33745627438 scopus 로고    scopus 로고
    • Memoryless facility location in one pass
    • D. Fotakis. Memoryless facility location in one pass. In proc. of STACS 2006, pp. 608-620, 2006.
    • (2006) proc. of STACS , pp. 608-620
    • Fotakis, D.1
  • 11
    • 84937555419 scopus 로고    scopus 로고
    • P. Golle and I. Mironov. Uncheatable distributed computations. In proc. of CT-RSA 2001, pp. 425-440, 2001.
    • P. Golle and I. Mironov. Uncheatable distributed computations. In proc. of CT-RSA 2001, pp. 425-440, 2001.
  • 15
    • 4544259607 scopus 로고    scopus 로고
    • Rational secret sharing and multiparty computation
    • J.Y. Halpern and V. Teague. Rational secret sharing and multiparty computation. In proc. of STOC 2004, pp. 623-632, 2004.
    • (2004) proc. of STOC , pp. 623-632
    • Halpern, J.Y.1    Teague, V.2
  • 16
    • 33845248674 scopus 로고    scopus 로고
    • Robust network supercomputing with malicious processes
    • K.M. Konwar, S. Rajasekaran, and A.A. Shvartsman. Robust network supercomputing with malicious processes. In proc. of DISC 2006, pp. 474-488, 2006.
    • (2006) proc. of DISC , pp. 474-488
    • Konwar, K.M.1    Rajasekaran, S.2    Shvartsman, A.A.3
  • 19
    • 34547371465 scopus 로고    scopus 로고
    • The price of selfish routing
    • M.Mavronicolas and P. Spirakis. The price of selfish routing. Algorithmica, 48(1):91-126, 2007.
    • (2007) Algorithmica , vol.48 , Issue.1 , pp. 91-126
    • Mavronicolas, M.1    Spirakis, P.2
  • 20
    • 33748677680 scopus 로고    scopus 로고
    • When selfish meets evil: Byzantine players in a virus inoculation game
    • T. Moscibroda, S. Schmid, and R. Wattenhofer. When selfish meets evil: byzantine players in a virus inoculation game. In proc. of PODC 2006, pp. 35-44, 2006.
    • (2006) proc. of PODC , pp. 35-44
    • Moscibroda, T.1    Schmid, S.2    Wattenhofer, R.3
  • 21
    • 0002021736 scopus 로고
    • Equilibrium points in n-person games
    • J.F. Nash. Equilibrium points in n-person games. National Academy of Sciences, 36(1):48-49, 1950.
    • (1950) National Academy of Sciences , vol.36 , Issue.1 , pp. 48-49
    • Nash, J.F.1
  • 23
    • 84926080684 scopus 로고    scopus 로고
    • N. Nisan, T. Roughgarden, E. Tardos, and V.V. Vazirani, editors, Cambridge University Press
    • N. Nisan, T. Roughgarden, E. Tardos, and V.V. Vazirani, editors. Algorithmic Game Theory. Cambridge University Press, 2007.
    • (2007) Algorithmic Game Theory
  • 24
    • 85081506576 scopus 로고    scopus 로고
    • A. Lopez-Ortiz. Algorithmic foundations of the Internet. ACM SIGACT News Distributed Computing Column 18, 2005.
    • A. Lopez-Ortiz. Algorithmic foundations of the Internet. ACM SIGACT News Distributed Computing Column 18, 2005.
  • 25
    • 0038183237 scopus 로고    scopus 로고
    • How bad is selfish routing?
    • T. Roughgarden and E. Tardos. How bad is selfish routing? Journal of ACM, 49(2):236-259, 2002.
    • (2002) Journal of ACM , vol.49 , Issue.2 , pp. 236-259
    • Roughgarden, T.1    Tardos, E.2
  • 26
    • 35248860839 scopus 로고    scopus 로고
    • Rationality and self-interest in P2P networks
    • J. Shneidman and D.C. Parkes. Rationality and self-interest in P2P networks. In proc. of IPTPS 2003, pp. 139-148, 2003.
    • (2003) proc. of IPTPS , pp. 139-148
    • Shneidman, J.1    Parkes, D.C.2
  • 27
    • 85081510542 scopus 로고    scopus 로고
    • "TeraGrid", http://www.teragrid.org.
  • 28
    • 33745800476 scopus 로고    scopus 로고
    • On the cost-ineffectiveness of redundancy in commercial P2P computing
    • M. Yurkewych, B.N. Levine, and A.L. Rosenberg. On the cost-ineffectiveness of redundancy in commercial P2P computing. In proc. of CCS 2005, pp. 280-288, 2005.
    • (2005) proc. of CCS , pp. 280-288
    • Yurkewych, M.1    Levine, B.N.2    Rosenberg, A.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.