-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
I. Abraham, D. Dolev, R. Goden, and J.Y. Halpern. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In proc. of PODC 2006, pp. 53-62, 2006.
-
(2006)
Proc. of PODC 2006
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Goden, R.3
Halpern, J.Y.4
-
2
-
-
33845400316
-
BAR fault tolerance for cooperative services
-
A. S. Aiyer, L. Alvisi, A. Clement, M. Dahlin, J. Martin, and C. Porth. BAR fault tolerance for cooperative services. In proc. of SOSP 2005, pp. 45-58, 2005.
-
(2005)
Proc. of SOSP 2005
, pp. 45-58
-
-
Aiyer, A.S.1
Alvisi, L.2
Clement, A.3
Dahlin, M.4
Martin, J.5
Porth, C.6
-
3
-
-
10444272266
-
BOINC: A system for public-resource computing and storage
-
D. Anderson. BOINC: A system for public-resource computing and storage. In proc. of GRID 2004, pp. 4-10, 2004.
-
(2004)
Proc. of GRID 2004
, pp. 4-10
-
-
Anderson, D.1
-
6
-
-
84969257793
-
Convergence to approximate Nash equilibria in congestion games
-
S. Chien and A. Sinclair. Convergence to approximate Nash equilibria in congestion games. In proc. of SODA 2007, pp. 169-178, 2007.
-
(2007)
Proc. of SODA 2007
, pp. 169-178
-
-
Chien, S.1
Sinclair, A.2
-
9
-
-
0036655944
-
Fault tolerant implementation
-
K. Eliaz. Fault tolerant implementation. Review of Economic Studies, 69:589-610, 2002.
-
(2002)
Review of Economic Studies
, vol.69
, pp. 589-610
-
-
Eliaz, K.1
-
11
-
-
38949162207
-
Reliably executing tasks in the presence of untrusted processors
-
A. Fernandez, Ch. Georgiou, L. Lopez, and A. Santos. Reliably executing tasks in the presence of untrusted processors. In proc. of SRDS 2006, pp. 39-50, 2006.
-
(2006)
Proc. of SRDS 2006
, pp. 39-50
-
-
Fernandez, A.1
Georgiou, Ch.2
Lopez, L.3
Santos, A.4
-
13
-
-
35248839662
-
On death, taxes, and the convergence of P2P and grid computing
-
I.T. Foster and A. Iamnitchi. On death, taxes, and the convergence of P2P and grid computing. In proc. of IPTPS 2003, pp. 118-128, 2003.
-
(2003)
Proc. of IPTPS 2003
, pp. 118-128
-
-
Foster, I.T.1
Iamnitchi, A.2
-
14
-
-
33745627438
-
Memoryless facility location in one pass
-
D. Fotakis. Memoryless facility location in one pass. In proc. of STACS 2006, pp. 608-620, 2006.
-
(2006)
Proc. of STACS 2006
, pp. 608-620
-
-
Fotakis, D.1
-
15
-
-
77953977116
-
Malicious Bayesian congestion games
-
M. Gairing. Malicious Bayesian congestion games. In proc. of WAOA 2008, pp. 119-132, 2008.
-
(2008)
Proc. of WAOA 2008
, pp. 119-132
-
-
Gairing, M.1
-
16
-
-
84937555419
-
Uncheatable distributed computations
-
P. Golle and I. Mironov. Uncheatable distributed computations. In proc. of CT-RSA 2001, pp. 425-440, 2001.
-
(2001)
Proc. of CT-RSA 2001
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
17
-
-
10444254599
-
On spectrum sharing games
-
M. Halldorsson, J.Y. Halpern, L. Li, and V. Mirrokni. On spectrum sharing games. In proc. of PODC 2004, pp. 107-114, 2004.
-
(2004)
Proc. of PODC 2004
, pp. 107-114
-
-
Halldorsson, M.1
Halpern, J.Y.2
Li, L.3
Mirrokni, V.4
-
19
-
-
4544259607
-
Rational secret sharing and multiparty computation
-
J.Y. Halpern and V. Teague. Rational secret sharing and multiparty computation. In proc. of STOC 2004, pp. 623-632.
-
Proc. of STOC 2004
, pp. 623-632
-
-
Halpern, J.Y.1
Teague, V.2
-
20
-
-
0000725055
-
Games with incomplete information played by Bayesian players, I, II, III
-
320332, 468502, 1967
-
J. C. Harsanyi. Games with incomplete information played by Bayesian players, I, II, III. Management Science, 14:159182, 320332, 468502, 1967.
-
Management Science
, vol.14
, pp. 159182
-
-
Harsanyi, J.C.1
-
21
-
-
0010651267
-
A new method of solving numerical equations of all orders by continuous approximation
-
W. G. Horner. A new method of solving numerical equations of all orders by continuous approximation. Philos. Trans. Roy. Soc. London 109:308-335, 1819.
-
(1819)
Philos. Trans. Roy. Soc. London
, vol.109
, pp. 308-335
-
-
Horner, W.G.1
-
23
-
-
0003243695
-
SETI@home: Massively distributed computing for SETI
-
E. Korpela, D. Werthimer, D. Anderson, J. Cobb, and M. Lebofsky. SETI@home: Massively distributed computing for SETI. Computing in Science and Engineering, 3(1):78-83, 2001.
-
(2001)
Computing in Science and Engineering
, vol.3
, Issue.1
, pp. 78-83
-
-
Korpela, E.1
Werthimer, D.2
Anderson, D.3
Cobb, J.4
Lebofsky, M.5
-
25
-
-
85076879765
-
FlightPath: Obedience vs. choice in cooperative services
-
H. C. Li, A. Clement, M. Marchetti, M. Kapritsos, L. Robison, L. Alvisi, and M. Dahlin. FlightPath: Obedience vs. choice in cooperative services. In proc. of OSDI 2008, pp. 355-368, 2008.
-
(2008)
Proc. of OSDI 2008
, pp. 355-368
-
-
Li, H.C.1
Clement, A.2
Marchetti, M.3
Kapritsos, M.4
Robison, L.5
Alvisi, L.6
Dahlin, M.7
-
26
-
-
85043380426
-
BAR gossip
-
H. C. Li, A. Clement, E. L. Wong, J. Napper, I. Roy, L. Alvisi, and M. Dahlin. BAR gossip. In proc. of OSDI 2006, pp. 191-204, 2006.
-
(2006)
Proc. of OSDI 2006
, pp. 191-204
-
-
Li, H.C.1
Clement, A.2
Wong, E.L.3
Napper, J.4
Roy, I.5
Alvisi, L.6
Dahlin, M.7
-
28
-
-
34547371465
-
The price of selfish routing
-
M. Mavronicolas and P. Spirakis. The price of selfish routing. Algorithmica, 48(1):91-126, 2007.
-
(2007)
Algorithmica
, vol.48
, Issue.1
, pp. 91-126
-
-
Mavronicolas, M.1
Spirakis, P.2
-
30
-
-
33748677680
-
When selfish meets evil: Byzantine players in a virus inoculation game
-
T. Moscibroda, S. Schmid, and R. Wattenhofer. When selfish meets evil: byzantine players in a virus inoculation game. In proc. of PODC 2006, pp. 35-44, 2006.
-
(2006)
Proc. of PODC 2006
, pp. 35-44
-
-
Moscibroda, T.1
Schmid, S.2
Wattenhofer, R.3
-
31
-
-
0002021736
-
Equilibrium points in n-person games
-
J.F. Nash. Equilibrium points in n-person games. National Academy of Sciences, 36(1):48-49, 1950.
-
(1950)
National Academy of Sciences
, vol.36
, Issue.1
, pp. 48-49
-
-
Nash, J.F.1
-
33
-
-
84926080684
-
-
N. Nisan, T. Roughgarden, E. Tardos, and V.V. Vazirani, editors, Cambridge University Press
-
N. Nisan, T. Roughgarden, E. Tardos, and V.V. Vazirani, editors. Algorithmic Game Theory. Cambridge University Press, 2007.
-
(2007)
Algorithmic Game Theory
-
-
-
35
-
-
0038183237
-
How bad is selfish routing?
-
T. Roughgarden and E. Tardos. How bad is selfish routing? Journal of ACM, 49(2):236-259, 2002.
-
(2002)
Journal of ACM
, vol.49
, Issue.2
, pp. 236-259
-
-
Roughgarden, T.1
Tardos, E.2
-
36
-
-
34250442766
-
A class of games possessing pure-strategy Nash equilibria
-
R. W. Rosenthal. A class of games possessing pure-strategy Nash equilibria. International Journal of Game Theory, 2:65-67, 1973.
-
(1973)
International Journal of Game Theory
, vol.2
, pp. 65-67
-
-
Rosenthal, R.W.1
-
37
-
-
35248860839
-
Rationality and self-interest in P2P networks
-
J. Shneidman and D.C. Parkes. Rationality and self-interest in P2P networks. In proc. of IPTPS 2003, pp. 139-148, 2003.
-
(2003)
Proc. of IPTPS 2003
, pp. 139-148
-
-
Shneidman, J.1
Parkes, D.C.2
-
38
-
-
85081508136
-
-
Tables of Probability Functions, Volume = 2, National Bureau of Standards, 1942
-
Tables of Probability Functions, Volume = 2, National Bureau of Standards, 1942.
-
-
-
-
39
-
-
33745800476
-
On the cost-ineffectiveness of redundancy in commercial P2P computing
-
M. Yurkewych, B.N. Levine, and A.L. Rosenberg. On the cost-ineffectiveness of redundancy in commercial P2P computing. In proc. of CCS 2005, pp. 280-288, 2005.
-
(2005)
Proc. of CCS 2005
, pp. 280-288
-
-
Yurkewych, M.1
Levine, B.N.2
Rosenberg, A.L.3
|