-
1
-
-
0041783510
-
Privacy-preserving data mining
-
In, Dallas, TX. Available at
-
Agrawal, R., and R. Srikant. 2000. Privacy-preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data, 439-450, Dallas, TX. Available at: http://dl.acm.org/citation. cfm?doid=342009.335438
-
(2000)
Proceedings of the ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
33750054384
-
Efficient correlated action selection
-
In Available at
-
Atallah, M. J., M. Blanton, E. K. B. Frikken, and J. Li. 2006. Efficient correlated action selection. In Proceedings of Financial Cryptography, 296-310. Available at: https://www.cs.purdue.edu/homes/ mja/sscc/documents/fc06-slides.pdf
-
(2006)
Proceedings of Financial Cryptography
, pp. 296-310
-
-
Atallah, M.J.1
Blanton, M.2
Frikken, E.K.B.3
Li, J.4
-
5
-
-
0002591736
-
Local optimization of global objectives: Competitive distributed deadlock resolution and resource allocation
-
In Available at
-
Awerbuch, B., and Y. Azar. 1994. Local optimization of global objectives: Competitive distributed deadlock resolution and resource allocation. In Proceedings of IEEE Symposium on Foundations of Computer Science, 240-249. Available at: http://www.cs.tau.ac.il/;azar/conc.pdf
-
(1994)
Proceedings of IEEE Symposium on Foundations of Computer Science
, pp. 240-249
-
-
Awerbuch, B.1
Azar, Y.2
-
7
-
-
77949293665
-
Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest
-
Bandyopadhyay, T., V. S. Jacob, and S. Raghunathan. 2010. Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest. Information Technology and Management 11 (1): 7-23.
-
(2010)
Information Technology and Management
, vol.11
, Issue.1
, pp. 7-23
-
-
Bandyopadhyay, T.1
Jacob, V.S.2
Raghunathan, S.3
-
8
-
-
0001415601
-
Fair distribution protocols or how the players replace fortune
-
Barany, I. 1992. Fair distribution protocols or how the players replace fortune. Mathematics of Operations Research 17 (2): 327-340.
-
(1992)
Mathematics of Operations Research
, vol.17
, Issue.2
, pp. 327-340
-
-
Barany, I.1
-
9
-
-
11144283310
-
Fast, distributed approximation algorithms for positive linear programming with applications to flow control
-
Bartal, Y., J. W. Byers, and D. Raz. 2004. Fast, distributed approximation algorithms for positive linear programming with applications to flow control. SIAM Journal on Computing 33 (6): 1261-1279.
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.6
, pp. 1261-1279
-
-
Bartal, Y.1
Byers, J.W.2
Raz, D.3
-
13
-
-
84898960610
-
Completeness theorems for non-cryptographic faulttolerant distributed computation
-
In Available at
-
Ben-Or, M., S. Goldwasser, and A. Wigderson. 1998. Completeness theorems for non-cryptographic faulttolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1-10. Available at: http://www.researchgate.net/publication/221590203_Completeness_ Theorems_for_Non-Cryptographic_Fault-Tolerant_Distributed_Computation_%28Extended_ Abstract%29
-
(1998)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
14
-
-
0000621526
-
Correlation without mediation: Expanding the set of equilibrium outcomes by "cheap" pre-play procedures
-
Ben-Porath, E. 1998. Correlation without mediation: Expanding the set of equilibrium outcomes by "cheap" pre-play procedures. Journal of Economic Theory 80 (1): 108-122.
-
(1998)
Journal of Economic Theory
, vol.80
, Issue.1
, pp. 108-122
-
-
Ben-Porath, E.1
-
18
-
-
33744793469
-
Procuring fast delivery: Sole sourcing with information asymmetry
-
Cachon, G. P., and F. Zhang. 2006. Procuring fast delivery: Sole sourcing with information asymmetry. Management Science 52 (6): 881-896.
-
(2006)
Management Science
, vol.52
, Issue.6
, pp. 881-896
-
-
Cachon, G.P.1
Zhang, F.2
-
20
-
-
0036038991
-
Universally composable two-party and multiparty secure computation
-
In Available at
-
Canetti, R., Y. Lindell, R. Ostrovsky, and A. Sahai. 2002. Universally composable two-party and multiparty secure computation. In STOC '02: Proceedings of the Thirty-Fourth Annual ACM Symposium on Theory of Computing, 494-503. Available at: http://www.cs.ucla.edu/;rafail/PUBLIC/57.pdf
-
(2002)
STOC '02: Proceedings of the Thirty-Fourth Annual ACM Symposium on Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
21
-
-
32844458303
-
On the limitations of universally composable two-party computation without set-up assumptions
-
An extended abstract appeared in Eurocrypt 2003. New York, NY: Springer-Verlag (LNCS 2656), 68-86
-
Canetti, R., E. Kushilevitz, and Y. Lindell. 2006. On the limitations of universally composable two-party computation without set-up assumptions. Journal of Cryptology 19 (2): 135-167. An extended abstract appeared in Eurocrypt 2003. New York, NY: Springer-Verlag (LNCS 2656), 68-86.
-
(2006)
Journal of Cryptology
, vol.19
, Issue.2
, pp. 135-167
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
24
-
-
84885922754
-
Secure multi-party collaboration systems in supply chain management
-
In Available at
-
Chen, S., C. Wang, D. Liu, and G. Singh. 2011. Secure multi-party collaboration systems in supply chain management. In Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, 105-107. Available at: http://www.researchgate.net/publication/221251905_ Secure_Multi-party_Collaboration_Systems_in_Supply_Chain_Management
-
(2011)
Proceedings of the 1st International Conference on Logistics, Informatics and Service Science
, pp. 105-107
-
-
Chen, S.1
Wang, C.2
Liu, D.3
Singh, G.4
-
25
-
-
61349161743
-
An approach to identifying beneficial collaboration securely in decentralized logistics systems
-
Clifton, C., A. Iyer, R. Cho, W. Jiang, M. Kantarcioglu, and J. Vaidya. 2008. An approach to identifying beneficial collaboration securely in decentralized logistics systems. Manufacturing & Service Operations Management 10 (1): 108-125.
-
(2008)
Manufacturing & Service Operations Management
, vol.10
, Issue.1
, pp. 108-125
-
-
Clifton, C.1
Iyer, A.2
Cho, R.3
Jiang, W.4
Kantarcioglu, M.5
Vaidya, J.6
-
27
-
-
33751092054
-
Competition and confidentiality: Signaling quality in a duopoly when there is universal private information
-
Daughety, A., and J. Reinganum. 2007. Competition and confidentiality: Signaling quality in a duopoly when there is universal private information. Games and Economic Behavior 58 (1): 94-120.
-
(2007)
Games and Economic Behavior
, vol.58
, Issue.1
, pp. 94-120
-
-
Daughety, A.1
Reinganum, J.2
-
29
-
-
79952655207
-
Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts
-
Deshpande, V., L. Schwarz, M. Atallah, M. Blanton, and K. Frikken. 2011. Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts. Production and Operations Management 20 (2): 165-180.
-
(2011)
Production and Operations Management
, vol.20
, Issue.2
, pp. 165-180
-
-
Deshpande, V.1
Schwarz, L.2
Atallah, M.3
Blanton, M.4
Frikken, K.5
-
31
-
-
84856170890
-
Practical privacy-preserving multi-party linear programming based on problem transformation
-
In Available at
-
Dreier, J., and F. Kerschbaum. 2011. Practical privacy-preserving multi-party linear programming based on problem transformation. In Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust, 916-924. Available at: http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=6113241
-
(2011)
Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust
, pp. 916-924
-
-
Dreier, J.1
Kerschbaum, F.2
-
34
-
-
0242625281
-
Privacy preserving mining of association rules
-
In Available at
-
Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke. 2002. Privacy preserving mining of association rules. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 217-228. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.19.3747
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
36
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E., and A. Ghose. 2005. The economic incentives for sharing security information. Information Systems Research 16 (2): 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
37
-
-
0347662287
-
Unmediated communication in games with complete and incomplete information
-
Gerardi, D. 2004. Unmediated communication in games with complete and incomplete information. Journal of Economic Theory 114 (1): 104-131.
-
(2004)
Journal of Economic Theory
, vol.114
, Issue.1
, pp. 104-131
-
-
Gerardi, D.1
-
38
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
In Available at
-
Goldreich, O., S. Micali, and A. Wigderson. 1987. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the 19th ACM Symposium on Theory of Computing, 218-229. Available at: http://www.bibsonomy.org/bibtex/211382b846bc9c7535d 37daf703a9a00f/danfunky
-
(1987)
Proceedings of the 19th ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
39
-
-
84903187785
-
Chapter 5: Encryption schemes
-
In Cambridge, MA: Cambridge University Press
-
Goldreich, O. 2004. Chapter 5: Encryption schemes. In The Foundations of Cryptography, Volume 2. Cambridge, MA: Cambridge University Press.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
40
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
In New York, NY: Springer-Verlag. Available at
-
Goldwasser, S., and L. A. Levin. 1991. Fair computation of general functions in presence of immoral majority. In CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, 77-93. New York, NY: Springer-Verlag. Available at: http://www. researchgate.net/publication/221355525_Fair_Computation_of_General_Functions_in_Presence_of_ Immoral_Majority
-
(1991)
CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.A.2
-
41
-
-
84863393378
-
Preserving privacy in social networks: A structure-aware approach
-
In Available at
-
He, X., J. Vaidya, B. Shafiq, N. R. Adam, and V. Atluri. 2009. Preserving privacy in social networks: A structure-aware approach. In Proceedings of the 8th International Conference on Web Intelligence, 647-654. Available at: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5284903
-
(2009)
Proceedings of the 8th International Conference on Web Intelligence
, pp. 647-654
-
-
He, X.1
Vaidya, J.2
Shafiq, B.3
Adam, N.R.4
Atluri, V.5
-
42
-
-
74549172518
-
Effective anonymization of query logs
-
In Available at
-
Hong, Y., X. He, J. Vaidya, N. R. Adam, and V. Atluri. 2009. Effective anonymization of query logs. In Proceedings of the 18th ACM Conference on Information and Knowledge Management, 1465-1468. Available at: http://dl.acm.org/citation.cfm?doid=1645953.1646146
-
(2009)
Proceedings of the 18th ACM Conference on Information and Knowledge Management
, pp. 1465-1468
-
-
Hong, Y.1
He, X.2
Vaidya, J.3
Adam, N.R.4
Atluri, V.5
-
44
-
-
84856161025
-
Privacy-preserving tabu search for distributed graph coloring
-
In Available at
-
Hong, Y., J. Vaidya, H. Lu, and B. Shafiq. 2011b. Privacy-preserving tabu search for distributed graph coloring. In Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust, 951-958. Available at: http://www.bibsonomy.org/bibtex/2aa159b42f383bea482fb 0cb469eff030/dblp
-
(2011)
Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust
, pp. 951-958
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Shafiq, B.4
-
45
-
-
84872255959
-
Secure and efficient distributed linear programming
-
Hong, Y., J. Vaidya, and H. Lu. 2012a. Secure and efficient distributed linear programming. Journal of Computer Security 20 (5): 583-634.
-
(2012)
Journal of Computer Security
, vol.20
, Issue.5
, pp. 583-634
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
-
46
-
-
84863503836
-
Differentially private search log sanitization with optimal output utility
-
In Available at
-
Hong, Y., J. Vaidya, H. Lu, and M. Wu. 2012b. Differentially private search log sanitization with optimal output utility. In Proceedings of the 15th International Conference on Extending Database Technology, 50-61. Available at: http://www.bibsonomy.org/bibtex/24e11f0441865a8c682d 51f2ea307bc29/dblp
-
(2012)
Proceedings of the 15th International Conference on Extending Database Technology
, pp. 50-61
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Wu, M.4
-
48
-
-
84892875548
-
An inference-proof approach to privacy-preserving horizontally partitioned linear programs
-
Hong, Y., and J. Vaidya. 2013a. An inference-proof approach to privacy-preserving horizontally partitioned linear programs. Optimization Letters 8 (1): 267-277.
-
(2013)
Optimization Letters
, vol.8
, Issue.1
, pp. 267-277
-
-
Hong, Y.1
Vaidya, J.2
-
49
-
-
84903194529
-
Secure transformation for multiparty linear programming
-
Available at
-
Hong, Y., and J. Vaidya. 2013b. Secure transformation for multiparty linear programming. Rutgers Technical Report. Available at: http://www.albany.edu/faculty/hong/pub/SecTran.pdf
-
(2013)
Rutgers Technical Report
-
-
Hong, Y.1
Vaidya, J.2
-
51
-
-
84875272475
-
Delegation vs. control of component procurement under asymmetric cost information and simple contracts
-
Kayis, E., F. Erhun, and E. L. Plambeck. 2013. Delegation vs. control of component procurement under asymmetric cost information and simple contracts. Manufacturing and Service Operations Management 15 (1): 45-56.
-
(2013)
Manufacturing and Service Operations Management
, vol.15
, Issue.1
, pp. 45-56
-
-
Kayis, E.1
Erhun, F.2
Plambeck, E.L.3
-
52
-
-
84874161687
-
Collaborative cost reduction and component procurement under information asymmetry
-
Kim, S. H., and S. Netessine. 2013. Collaborative cost reduction and component procurement under information asymmetry. Management Science 59 (1): 189-206.
-
(2013)
Management Science
, vol.59
, Issue.1
, pp. 189-206
-
-
Kim, S.H.1
Netessine, S.2
-
53
-
-
26444479778
-
Optimization by simulated annealing
-
Kirkpatrick, S., C. D. Gelatt, and M. P. Vecchi. 1983. Optimization by simulated annealing. Science 220 (4598): 671-680.
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.D.2
Vecchi, M.P.3
-
55
-
-
10444265884
-
Completely fair SFE and coalition-safe cheap talk
-
In Available at
-
Lepinski, M., S. Micali, C. Peikert, and A. Shelat. 2004. Completely fair SFE and coalition-safe cheap talk. In PODC '04: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 1-10. Available at: http://dl.acm.org/citation.cfm?id=1011769
-
(2004)
PODC '04: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
56
-
-
68349114917
-
Second sourcing vs. sole sourcing with capacity investment and asymmetric information
-
Li, C., and L. G. Debo. 2009. Second sourcing vs. sole sourcing with capacity investment and asymmetric information. Manufacturing & Service Operations Management 11 (3): 448-470.
-
(2009)
Manufacturing & Service Operations Management
, vol.11
, Issue.3
, pp. 448-470
-
-
Li, C.1
Debo, L.G.2
-
58
-
-
61849158326
-
Confidentiality and information sharing in supply chain coordination
-
Li, L., and H. Zhang. 2008. Confidentiality and information sharing in supply chain coordination. Management Science 54 (8): 1467-1481.
-
(2008)
Management Science
, vol.54
, Issue.8
, pp. 1467-1481
-
-
Li, L.1
Zhang, H.2
-
59
-
-
84872266260
-
Privacy-preserving horizontally partitioned linear programs with inequality constraints
-
Li, W., H. Li, and C. Deng. 2013. Privacy-preserving horizontally partitioned linear programs with inequality constraints. Optimization Letters 7 (1): 137-144.
-
(2013)
Optimization Letters
, vol.7
, Issue.1
, pp. 137-144
-
-
Li, W.1
Li, H.2
Deng, C.3
-
60
-
-
0035351881
-
Producer-supplier contracts with incomplete information
-
Lim, W. S. 2001. Producer-supplier contracts with incomplete information. Management Science 47 (5): 709-715.
-
(2001)
Management Science
, vol.47
, Issue.5
, pp. 709-715
-
-
Lim, W.S.1
-
61
-
-
19744365747
-
Privacy preserving clustering with distributed EM mixture modeling
-
Lin, X., C. Clifton, and M. Zhu. 2005. Privacy preserving clustering with distributed EM mixture modeling. Knowledge and Information Systems 8 (1): 68-81.
-
(2005)
Knowledge and Information Systems
, vol.8
, Issue.1
, pp. 68-81
-
-
Lin, X.1
Clifton, C.2
Zhu, M.3
-
64
-
-
0345412673
-
General composition and universal composability in secure multiparty computation
-
In Available at
-
Lindell, Y. 2003b. General composition and universal composability in secure multiparty computation. In Proceedings of the 44th Symposium on Foundations of Computer Science, 394-403. Available at: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1238213
-
(2003)
Proceedings of the 44th Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Lindell, Y.1
-
66
-
-
78650750065
-
Privacy-preserving linear programming
-
Mangasarian, O. L. 2011. Privacy-preserving linear programming. Optimization Letters 5 (1): 165-172.
-
(2011)
Optimization Letters
, vol.5
, Issue.1
, pp. 165-172
-
-
Mangasarian, O.L.1
-
67
-
-
84857650296
-
Privacy-preserving horizontally partitioned linear programs
-
Mangasarian, O. L. 2012. Privacy-preserving horizontally partitioned linear programs. Optimization Letters 6 (3): 431-436.
-
(2012)
Optimization Letters
, vol.6
, Issue.3
, pp. 431-436
-
-
Mangasarian, O.L.1
-
68
-
-
84898169962
-
Information security and economics in computer networks: An interdisciplinary survey and a proposal of integrated optimization of investment
-
In Available at
-
Matsuura, K. 2003. Information security and economics in computer networks: An interdisciplinary survey and a proposal of integrated optimization of investment. In Proceedings of the 9th International Conference of Computing in Economics and Finance. Available at: http://depts.washington.edu/ sce2003/Papers/48.pdf
-
(2003)
Proceedings of the 9th International Conference of Computing in Economics and Finance
-
-
Matsuura, K.1
-
69
-
-
84865091365
-
Integrating carrier selection with supplier selection decisions to improve supply chain security
-
Meixell, M. J., and M. Norbis. 2012. Integrating carrier selection with supplier selection decisions to improve supply chain security. International Transactions in Operations Research 19 (5): 711-732.
-
(2012)
International Transactions in Operations Research
, vol.19
, Issue.5
, pp. 711-732
-
-
Meixell, M.J.1
Norbis, M.2
-
70
-
-
34548628909
-
Privacy problems with anonymized transaction databases
-
In, New York, NY: Springer-Verlag
-
Mielikainen, T. 2004. Privacy problems with anonymized transaction databases. In Discovery Science: 7th International Conference Proceedings, Lecture Notes in Computer Science, Volume 3245, 219-229. New York, NY: Springer-Verlag.
-
(2004)
Discovery Science: 7th International Conference Proceedings, Lecture Notes in Computer Science
, vol.3245
, pp. 219-229
-
-
Mielikainen, T.1
-
71
-
-
68349095250
-
Privacy protection and technology diffusion: The case of electronic medical records
-
Miller, A. R., and C. Tucker. 2009. Privacy protection and technology diffusion: The case of electronic medical records. Management Science 55 (7): 1077-1093.
-
(2009)
Management Science
, vol.55
, Issue.7
, pp. 1077-1093
-
-
Miller, A.R.1
Tucker, C.2
-
72
-
-
1142305185
-
An asynchronous complete method for distributed constraint optimization
-
In Available at
-
Modi, P. J., W-M. Shen, M. Tambe, and M. Yokoo. 2003. An asynchronous complete method for distributed constraint optimization. In AAMAS '03: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, 161-168. Available at: http://teamcore. usc.edu/papers/2003/modi-aamas03.pdf
-
(2003)
AAMAS '03: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems
, pp. 161-168
-
-
Modi, P.J.1
Shen, W.-M.2
Tambe, M.3
Yokoo, M.4
-
74
-
-
58849111529
-
Allocating costs in a collaborative transportation procurement network
-
Özener, Ö., and Ö. Ergun 2008. Allocating costs in a collaborative transportation procurement network. Transportation Science 42 (2): 146-165.
-
(2008)
Transportation Science
, vol.42
, Issue.2
, pp. 146-165
-
-
Özener, O.1
Ergun, O.2
-
79
-
-
72949124366
-
An efficient constraint optimization method for large multiagent systems
-
In Available at
-
Petcu, A., and B. Faltings. 2005b. An efficient constraint optimization method for large multiagent systems. In Proceedings of AAMAS05-LSMAS Workshop. Available at: http://citeseerx.ist.psu.edu/viewdoc/ summary?doi=10.1.1.385.5116
-
(2005)
Proceedings of AAMAS05-LSMAS Workshop
-
-
Petcu, A.1
Faltings, B.2
-
80
-
-
84903133680
-
Incentive compatible multiagent constraint optimization
-
In Available at
-
Petcu, A., and B. Faltings. 2005c. Incentive compatible multiagent constraint optimization. In Proceedings of WINE'05: Workshop on Internet and Network Economics. Available at: http://citeseer.ist.psu.edu/ viewdoc/summary;jsessionid=BBADCA8B49538E3E4BE6244CEDC970D8?doi=10.1.1.385.9181
-
(2005)
Proceedings of WINE'05: Workshop on Internet and Network Economics
-
-
Petcu, A.1
Faltings, B.2
-
81
-
-
84903172262
-
Optimal solution stability in continuous time optimization
-
In (DCR05). Available at
-
Petcu, A., and B. Faltings. 2005d. Optimal solution stability in continuous time optimization. In Proceedings of IJCAI05-Distributed Constraint Reasoning Workshop (DCR05). Available at: http:// citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.5650
-
(2005)
Proceedings of IJCAI05-Distributed Constraint Reasoning Workshop
-
-
Petcu, A.1
Faltings, B.2
-
83
-
-
29344456460
-
Superstabilizing, fault-containing multiagent combinatorial optimization
-
In (AAAI-05), Available at
-
Petcu, A., and B. Faltings. 2005f. Superstabilizing, fault-containing multiagent combinatorial optimization. In Proceedings of the National Conference on Artificial Intelligence (AAAI-05), 449-454. Available at: https://www.aaai.org/Papers/AAAI/2005/AAAI05-071.pdf
-
(2005)
Proceedings of the National Conference on Artificial Intelligence
, pp. 449-454
-
-
Petcu, A.1
Faltings, B.2
-
85
-
-
77249136766
-
Information sharing in a long-term supply chain relationship: The role of customer review strategy
-
Ren, Z. J., M. A. Cohen, T. H. Ho, and C. Terwiesch. 2010. Information sharing in a long-term supply chain relationship: The role of customer review strategy. Operations Research 58 (1): 81-93.
-
(2010)
Operations Research
, vol.58
, Issue.1
, pp. 81-93
-
-
Ren, Z.J.1
Cohen, M.A.2
Ho, T.H.3
Terwiesch, C.4
-
86
-
-
34548084042
-
A genetic algorithm for privacy preserving combinatorial optimization
-
In Available at
-
Sakuma, J., and S. Kobayashi. 2007. A genetic algorithm for privacy preserving combinatorial optimization. In Proceedings of 2007 Genetic and Evolutionary Computation Conference, 1372-1379. Available at: http://dl.acm.org/citation.cfm?doid=1276958.1277214
-
(2007)
Proceedings of 2007 Genetic and Evolutionary Computation Conference
, pp. 1372-1379
-
-
Sakuma, J.1
Kobayashi, S.2
-
90
-
-
34247393682
-
A critical balance: Collaboration and security in the IT-enabled supply chain
-
Smith, G. E., K. J. Watson, W. H. Baker, and J. A. Pokorski II. 2007. A critical balance: Collaboration and security in the IT-enabled supply chain. International Journal of Production Research 45 (11): 2595-2613.
-
(2007)
International Journal of Production Research
, vol.45
, Issue.11
, pp. 2595-2613
-
-
Smith, G.E.1
Watson, K.J.2
Baker, W.H.3
Pokorski II, J.A.4
-
91
-
-
35248879821
-
Secure generalized Vickrey auction using homomorphic encryption
-
Suzuki, K., and M. Yokoo. 2003. Secure generalized Vickrey auction using homomorphic encryption. Financial Cryptography 2742: 239-249.
-
(2003)
Financial Cryptography
, vol.2742
, pp. 239-249
-
-
Suzuki, K.1
Yokoo, M.2
-
93
-
-
33750068376
-
Selecting correlated random actions
-
In Available at
-
Teague, V. 2004. Selecting correlated random actions. In Proceedings of Financial Cryptography, 181-195. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1791
-
(2004)
Proceedings of Financial Cryptography
, pp. 181-195
-
-
Teague, V.1
-
94
-
-
0003497109
-
Chapter 2: Information technologies: Concepts and management
-
In 3rd Edition. New York, NY: John Wiley and Sons
-
Turban, E., R. K. Rainer, and R. E. Potter. 2005. Chapter 2: Information technologies: Concepts and management. In Introduction to Information Technology. 3rd Edition. New York, NY: John Wiley and Sons.
-
(2005)
Introduction to Information Technology
-
-
Turban, E.1
Rainer, R.K.2
Potter, R.E.3
-
96
-
-
69249243704
-
Privacy-preserving linear programming
-
In Available at
-
Vaidya, J. 2009a. Privacy-preserving linear programming. In Proceedings of the 24th Annual ACM Symposium on Applied Computing, 2002-2007. Available at: http://dl.acm.org/citation.cfm? id=1529729&CFID=403945105&CFTOKEN=15350398
-
(2009)
Proceedings of the 24th Annual ACM Symposium on Applied Computing
, pp. 2002-2007
-
-
Vaidya, J.1
-
99
-
-
85043435920
-
Distributed constraint satisfaction for formalizing distributed problem solving
-
In Available at
-
Yokoo, M., E. H. Durfee, T. Ishida, and K. Kuwabar. 1992. Distributed constraint satisfaction for formalizing distributed problem solving. In In Proceedings of International Conference on Distributed Computing Systems, 614-621. Available at: http://ieeexplore.ieee.org/xpl/articleDetails. jsp?arnumber=235101
-
(1992)
In Proceedings of International Conference on Distributed Computing Systems
, pp. 614-621
-
-
Yokoo, M.1
Durfee, E.H.2
Ishida, T.3
Kuwabar, K.4
-
100
-
-
0002818660
-
Distributed breakout algorithm for solving distributed constraint satisfaction problems
-
In edited by Lesser, V. Cambridge, MA: MIT Press
-
Yokoo, M., and K. Hirayama. 1995. Distributed breakout algorithm for solving distributed constraint satisfaction problems. In Proceedings of the First International Conference on Multi-Agent Systems, edited by Lesser, V. Cambridge, MA: MIT Press.
-
(1995)
Proceedings of the First International Conference on Multi-Agent Systems
-
-
Yokoo, M.1
Hirayama, K.2
-
101
-
-
84957005324
-
Secure distributed constraint satisfaction: Reaching agreement without revealing private information
-
In (CP-2002), Available at
-
Yokoo, M., K. Suzuki, and K. Hirayama. 2002. Secure distributed constraint satisfaction: Reaching agreement without revealing private information. In Proceedings of the Eighth International Conference on Principles and Practice of Constraint Programming (CP-2002), 387-401. Available at: http://www.researchgate.net/publication/221633421_Secure_Distributed_Constraint_ Satisfaction_Reaching_Agreement_without_Revealing_Private_Information
-
(2002)
Proceedings of the Eighth International Conference on Principles and Practice of Constraint Programming
, pp. 387-401
-
-
Yokoo, M.1
Suzuki, K.2
Hirayama, K.3
-
102
-
-
84862294667
-
Secure collaboration in global design and supply chain environment: Problem analysis and literature review
-
Zeng, Y., L. Wang, X. Deng, X. Cao, and N. Khundker. 2012. Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Computers in Industry 63 (6): 545-556.
-
(2012)
Computers in Industry
, vol.63
, Issue.6
, pp. 545-556
-
-
Zeng, Y.1
Wang, L.2
Deng, X.3
Cao, X.4
Khundker, N.5
|