메뉴 건너뛰기




Volumn 5873 LNCS, Issue , 2009, Pages 531-546

Model checking coalition nash equilibria in MAD distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED SYSTEMS; EXPLICIT ALGORITHMS; FINITE STATE; MALICIOUS NODES; MODEL CHECKER; MODEL CHECKING ALGORITHM; NASH EQUILIBRIA; NASH EQUILIBRIUM; NORMAL FORM;

EID: 70549111612     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-05118-0_37     Document Type: Conference Paper
Times cited : (5)

References (23)
  • 1
    • 33845400316 scopus 로고    scopus 로고
    • Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: Bar fault tolerance for cooperative services. In: Proc. of SOSP 2005, pp. 45-58. ACM Press, New York (2005)
    • Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: Bar fault tolerance for cooperative services. In: Proc. of SOSP 2005, pp. 45-58. ACM Press, New York (2005)
  • 2
    • 4544387814 scopus 로고    scopus 로고
    • Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science October
    • Batten, C., Barr, K., Saraf, A., Trepetin, S.: pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science (October 2002)
    • (2002) pStore: A secure peer-to-peer backup system
    • Batten, C.1    Barr, K.2    Saraf, A.3    Trepetin, S.4
  • 3
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • Bryant, R.: Graph-based algorithms for boolean function manipulation. IEEE Trans. on Computers C-35(8), 677-691 (1986)
    • (1986) IEEE Trans. on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.1
  • 4
    • 84924006188 scopus 로고    scopus 로고
    • Buttyán, L, Hubaux, J.-P, Security and Cooperation in Wireless Networks Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (version 1.5, Cambridge University Press, Cambridge 2007
    • Buttyán, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (version 1.5). Cambridge University Press, Cambridge (2007)
  • 5
    • 84969257793 scopus 로고    scopus 로고
    • Convergence to approximate nash equilibria in congestion games
    • Chien, S., Sinclair, A.: Convergence to approximate nash equilibria in congestion games. In: Proc. of SODA 2007, pp. 169-178 (2007)
    • (2007) Proc. of SODA 2007 , pp. 169-178
    • Chien, S.1    Sinclair, A.2
  • 7
    • 53349172205 scopus 로고    scopus 로고
    • Clement, A., Li, H., Napper, J., Martin, J.-P., Alvisi, L., Dahlin, M.: BAR primer. In: Proc. of DSN 2008 (2008)
    • Clement, A., Li, H., Napper, J., Martin, J.-P., Alvisi, L., Dahlin, M.: BAR primer. In: Proc. of DSN 2008 (2008)
  • 8
    • 70549091473 scopus 로고    scopus 로고
    • Incentives build robustness in bittorrent
    • Kaashoek, M.F, Stoica, I, eds, IPTPS 2003, Springer, Heidelberg
    • Cohen, B.: Incentives build robustness in bittorrent. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2735
    • Cohen, B.1
  • 9
    • 21644455728 scopus 로고    scopus 로고
    • Cox, L.P., Noble, B.D.: Samsara: honor among thieves in peer-to-peer storage. In: Proc. of SOSP 2003, pp. 120-132. ACM, New York (2003)
    • Cox, L.P., Noble, B.D.: Samsara: honor among thieves in peer-to-peer storage. In: Proc. of SOSP 2003, pp. 120-132. ACM, New York (2003)
  • 10
    • 58049138763 scopus 로고    scopus 로고
    • CUDD Web Page (2004), http://vlsi.colorado.edu/~fabio/
    • (2004) CUDD Web Page
  • 11
    • 0036655944 scopus 로고    scopus 로고
    • Fault tolerant implementation
    • Eliaz, K.: Fault tolerant implementation. Review of Economic Studies 69(3), 589-610 (2002)
    • (2002) Review of Economic Studies , vol.69 , Issue.3 , pp. 589-610
    • Eliaz, K.1
  • 12
    • 0002887378 scopus 로고
    • Recursive games. Contributions to the theory of games
    • Everett, H.: Recursive games. Contributions to the theory of games. Annals of Mathematical Studies, vol. III, p. 39 (1957)
    • (1957) Annals of Mathematical Studies , vol.3 , pp. 39
    • Everett, H.1
  • 13
    • 10444248045 scopus 로고    scopus 로고
    • Feigenbaum, J., Sami, R., Shenker, S.: Mechanism design for policy routing. In: Proc. of PODC 2004, pp. 11-20. ACM, New York (2004)
    • Feigenbaum, J., Sami, R., Shenker, S.: Mechanism design for policy routing. In: Proc. of PODC 2004, pp. 11-20. ACM, New York (2004)
  • 15
    • 33748117025 scopus 로고    scopus 로고
    • Hayrapetyan, A., Tardos, É., Wexler, T.: The effect of collusion in congestion games. In: Proc. of STOC 2006, pp. 89-98. ACM, New York (2006)
    • Hayrapetyan, A., Tardos, É., Wexler, T.: The effect of collusion in congestion games. In: Proc. of STOC 2006, pp. 89-98. ACM, New York (2006)
  • 17
    • 70549097435 scopus 로고    scopus 로고
    • Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative internet backup scheme. In: Proc. of ATEC 2003, p. 3. USENIX Association (2003)
    • Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative internet backup scheme. In: Proc. of ATEC 2003, p. 3. USENIX Association (2003)
  • 18
    • 80051768284 scopus 로고    scopus 로고
    • Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Sustaining cooperation in multi-hop wireless networks. In: Proc. of NSDI 2005, pp. 231-244. USENIX Association (2005)
    • Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Sustaining cooperation in multi-hop wireless networks. In: Proc. of NSDI 2005, pp. 231-244. USENIX Association (2005)
  • 19
    • 21644485107 scopus 로고    scopus 로고
    • Maniatis, P., Rosenthal, D.S.H., Roussopoulos, M., Baker, M., Giuli, T.J., Muliadi, Y.: Preserving peer replicas by rate-limited sampled voting. In: Proc. SOSP 2003, pp. 44-59. ACM, New York (2003)
    • Maniatis, P., Rosenthal, D.S.H., Roussopoulos, M., Baker, M., Giuli, T.J., Muliadi, Y.: Preserving peer replicas by rate-limited sampled voting. In: Proc. SOSP 2003, pp. 44-59. ACM, New York (2003)
  • 20
    • 58049181373 scopus 로고    scopus 로고
    • Model checking nash equilibria in mad distributed system
    • Cimatti, A, Jones, R.B, eds, IEEE, Los Alamitos
    • Mari, F., Melatti, I., Salvo, I., Tronci, E., Alvisi, L., Clement, A., Li, H.: Model checking nash equilibria in mad distributed system. In: Cimatti, A., Jones, R.B. (eds.) Proc. of FMCAD 2008, pp. 85-92. IEEE, Los Alamitos (2008)
    • (2008) Proc. of FMCAD , pp. 85-92
    • Mari, F.1    Melatti, I.2    Salvo, I.3    Tronci, E.4    Alvisi, L.5    Clement, A.6    Li, H.7
  • 21
    • 0032686324 scopus 로고    scopus 로고
    • Nisan, N., Ronen, A.: Algorithmic mechanism design (extended abstract). In: Proc. of STOC 1999, pp. 129-140. ACM, New York (1999)
    • Nisan, N., Ronen, A.: Algorithmic mechanism design (extended abstract). In: Proc. of STOC 1999, pp. 129-140. ACM, New York (1999)
  • 22
    • 58049151591 scopus 로고    scopus 로고
    • NuSMV Web Page (2006), http://nusmv.irst.itc.it/
    • (2006) NuSMV Web Page
  • 23
    • 10444240238 scopus 로고    scopus 로고
    • Shneidman, J., Parkes, D.C.: Specification faithfulness in networks with rational nodes. In: Proc. of PODC 2004, pp. 88-97. ACM, New York (2004)
    • Shneidman, J., Parkes, D.C.: Specification faithfulness in networks with rational nodes. In: Proc. of PODC 2004, pp. 88-97. ACM, New York (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.