-
1
-
-
33745648091
-
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey, " Computer Networks, vol. 50, no. 13, pp. 2027-2159, 2006.
-
(2006)
Computer Networks
, vol.50
, Issue.13
, pp. 2027-2159
-
-
Akyildiz, I.F.1
Lee, W.Y.2
Vuran, M.C.3
Mohanty, S.4
-
2
-
-
77952274769
-
Spectrum policy task force report
-
Spectrum Policy Task Force
-
Spectrum Policy Task Force, "Spectrum policy task force report, " Federal Communications Commission ET docket, 02-135, 2002.
-
(2002)
Federal Communications Commission et Docket
, pp. 02-135
-
-
-
4
-
-
34249036373
-
Dynamic spectrum sharing: A game theoretical overview
-
Z. Ji and K. Liu, "Dynamic spectrum sharing: A game theoretical overview, " IEEE Communications Magazine, vol. 45, no. 5, pp. 88-94, 2007.
-
(2007)
IEEE Communications Magazine
, vol.45
, Issue.5
, pp. 88-94
-
-
Ji, Z.1
Liu, K.2
-
5
-
-
70349694010
-
TRUST: A general framework for truthful double spectrum auctions
-
X. Zhou and H. Zheng, "TRUST: A general framework for truthful double spectrum auctions, " in INFOCOM'09, 2009.
-
(2009)
INFOCOM'09
-
-
Zhou, X.1
Zheng, H.2
-
6
-
-
79960850364
-
SMALL: A strategy-proof mechanism for radio spectrum allocation
-
F. Wu and N. Vaidya, "SMALL: A strategy-proof mechanism for radio spectrum allocation, " in INFOCOM'11, 2011.
-
(2011)
INFOCOM'11
-
-
Wu, F.1
Vaidya, N.2
-
7
-
-
14244266054
-
Approaches to spectrum sharing
-
J. Peha, "Approaches to spectrum sharing, " IEEE Communications Magazine, vol. 43, no. 2, pp. 10-12, 2005.
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.2
, pp. 10-12
-
-
Peha, J.1
-
8
-
-
34548759763
-
A general framework for wireless spectrum auctions
-
S. Gandhi, C. Buragohain, L. Cao, H. Zheng, and S. Suri, "A general framework for wireless spectrum auctions, " in DySPAN'07, 2007.
-
(2007)
DySPAN'07
-
-
Gandhi, S.1
Buragohain, C.2
Cao, L.3
Zheng, H.4
Suri, S.5
-
9
-
-
69249224463
-
An economic framework for dynamic spectrum access and service pricing
-
S. Sengupta, and M. Chatterjee, "An economic framework for dynamic spectrum access and service pricing, " IEEE/ACM Transactions on Networking, vol. 17, no. 4, pp. 1200-1213, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.4
, pp. 1200-1213
-
-
Sengupta, S.1
Chatterjee, M.2
-
10
-
-
70450159053
-
Revenue generation for truthful spectrum auction in dynamic spectrum access
-
J. Jia, Q. Zhang, Q. Zhang, and M. Liu, "Revenue generation for truthful spectrum auction in dynamic spectrum access, " in MobiHoc'09, 2009.
-
(2009)
MobiHoc'09
-
-
Jia, J.1
Zhang, Q.2
Zhang, Q.3
Liu, M.4
-
11
-
-
79960857311
-
Truthful spectrum auctions with approximate revenue
-
M. Al-Ayyoub and H. Gupta, "Truthful spectrum auctions with approximate revenue, " in INFOCOM'11, 2011.
-
(2011)
INFOCOM'11
-
-
Al-Ayyoub, M.1
Gupta, H.2
-
12
-
-
57849103529
-
Near-optimal dynamic spectrum allocation in cellular networks
-
A P. Subramanian, M. Al-Ayyoub, H. Gupta, et al. "Near-optimal dynamic spectrum allocation in cellular networks, " in DySPAN'08, 2008.
-
(2008)
DySPAN'08
-
-
Subramanian, A.P.1
Al-Ayyoub, M.2
Gupta, H.3
-
13
-
-
0001845798
-
Optimal auction design
-
R. Myerson, "Optimal auction design, " Mathematics of operations research, vol. 6, no. 1, pp. 58-73, 1981.
-
(1981)
Mathematics of Operations Research
, vol.6
, Issue.1
, pp. 58-73
-
-
Myerson, R.1
-
14
-
-
84883058458
-
SPRING: A strategy-proof and privacy preserving spectrum auction mechanism
-
Q. Huang, Y. Tao, and F. Wu, "SPRING: A strategy-proof and privacy preserving spectrum auction mechanism, " in INFOCOM'13, 2013.
-
(2013)
INFOCOM'13
-
-
Huang, Q.1
Tao, Y.2
Wu, F.3
-
15
-
-
0002920278
-
Mix and match: Secure function evaluation via ciphertexts
-
M. Jakobsson and A. Juels, "Mix and match: Secure function evaluation via ciphertexts, " in ASIA CRYPT'00, 2000.
-
(2000)
Asia CRYPT'00
-
-
Jakobsson, M.1
Juels, A.2
-
16
-
-
0002523070
-
An auction protocol which hides bids of losers
-
K. Sako, "An auction protocol which hides bids of losers, " in PKC'00, 2000.
-
(2000)
PKC'00
-
-
Sako, K.1
-
17
-
-
26844555678
-
Robust, privacy protecting and publicly verifiable sealed-bid auction
-
K. Peng, C. Boyd, E. Dawson, and K. Viswanathan, "Robust, privacy protecting and publicly verifiable sealed-bid auction, " in ICICS'02, 2002.
-
(2002)
ICICS'02
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Viswanathan, K.4
-
18
-
-
35848949079
-
Bidder-anonymous english auction scheme with privacy and public verifiability
-
Y. F. Chung, K. H. Huang, H. H. Lee, F. Lai, and T. S. Chen, "Bidder-anonymous english auction scheme with privacy and public verifiability, " Journal of Systems and Software, vol. 81, no. 1, pp. 113-119, 2008.
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.1
, pp. 113-119
-
-
Chung, Y.F.1
Huang, K.H.2
Lee, H.H.3
Lai, F.4
Chen, T.S.5
-
20
-
-
25844469792
-
Distributed algorithmic mechanism design: Recent results and future directions
-
September
-
J. Feigenbaum, and S. Shenker, "Distributed algorithmic mechanism design: Recent results and future directions, " September, in DialM'02, 2002.
-
(2002)
DialM'02
-
-
Feigenbaum, J.1
Shenker, S.2
-
21
-
-
50249086141
-
Differential privacy
-
C. Dwork, "Differential privacy, " in ICALP'06, 2006
-
(2006)
ICALP'06
-
-
Dwork, C.1
-
22
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar, "Mechanism design via differential privacy, " in FOCS'07, 2007.
-
(2007)
FOCS'07
-
-
McSherry, F.1
Talwar, K.2
-
23
-
-
77951678087
-
Differentially private combinatorial optimization
-
A. Gupta, K. Ligett, F. McSherry, A. Roth and K. Talwar. "Differentially private combinatorial optimization, " in SODA '10, 2010.
-
(2010)
SODA '10
-
-
Gupta, A.1
Ligett, K.2
McSherry, F.3
Roth, A.4
Talwar, K.5
-
24
-
-
79960862599
-
A prior-free revenue maximizing auction for secondary spectrum access
-
A. Gopinathan and Z. Li, "A prior-free revenue maximizing auction for secondary spectrum access, " in INFOCOM'11, 2011.
-
(2011)
INFOCOM'11
-
-
Gopinathan, A.1
Li, Z.2
-
25
-
-
9544219688
-
Approximately-strategyproof and tractable multiunit auctions
-
A. Kothari, DC. Parkes, and S. Suri, "Approximately-strategyproof and tractable multiunit auctions, " Decision Support Systems, vol. 39, no. 1, pp. 105-121, 2005.
-
(2005)
Decision Support Systems
, vol.39
, Issue.1
, pp. 105-121
-
-
Kothari, A.1
Parkes, D.C.2
Suri, S.3
-
26
-
-
55349099542
-
Truthful approximation mechanisms for restricted combinatorial auctions
-
A. Mu'Alem, and N. Nisan, "Truthful approximation mechanisms for restricted combinatorial auctions, " Games and Economic Behavior, vol. 64, no. 1, pp. 612-631, 2008.
-
(2008)
Games and Economic Behavior
, vol.64
, Issue.1
, pp. 612-631
-
-
Mu'Alem, A.1
Nisan, N.2
-
27
-
-
84856434218
-
Approximately optimal mechanism design via differential privacy
-
K. Nissim, R. Smorodinsky and M. Tennenholtz, "Approximately optimal mechanism design via differential privacy, " in ITCS'12, 2012.
-
(2012)
ITCS'12
-
-
Nissim, K.1
Smorodinsky, R.2
Tennenholtz, M.3
-
28
-
-
67650655439
-
Differential privacy: A survey of results
-
C. Dwork, "Differential privacy: A survey of results, " in TAMC 08, 2008.
-
(2008)
TAMC
, vol.8
-
-
Dwork, C.1
-
31
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy, " International Journal on Uncertainty, Fuzziness and Knowledge based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
32
-
-
0003061777
-
Privacy preserving auctions and mechanism design
-
M. Naor, B. Pinkas, and R. Sumner, "Privacy preserving auctions and mechanism design, " in EC'99, 1999.
-
(1999)
EC'99
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
33
-
-
0842296493
-
Secure Vickrey auctions without threshold trust
-
H. Lipmaa, N. Asokan, V. Niemi, "Secure Vickrey auctions without threshold trust, " in FC'03, 2003.
-
(2003)
FC'03
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
34
-
-
3142674238
-
Almost-dominant strategy implementation: Exchange economies
-
J. Schummer, "Almost-dominant strategy implementation: exchange economies, " Games and Economic Behavior, vol. 48, no. 1, pp. 154-170, 2004.
-
(2004)
Games and Economic Behavior
, vol.48
, Issue.1
, pp. 154-170
-
-
Schummer, J.1
-
35
-
-
1542299160
-
Impact of interference on multi-hop wireless network performance
-
K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu, "Impact of interference on multi-hop wireless network performance, " in MobiCom 03, 2003.
-
(2003)
MobiCom
, vol.3
-
-
Jain, K.1
Padhye, J.2
Padmanabhan, V.N.3
Qiu, L.4
-
36
-
-
84954261299
-
-
H. Huang, X. Li, Y. Sun, H. Xu, and L. Huang, "PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms, " in http://arxiv.org/pdf/1307.7792v1.pdf, 2013.
-
(2013)
PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms
-
-
Huang, H.1
Li, X.2
Sun, Y.3
Xu, H.4
Huang, L.5
-
37
-
-
84875666738
-
A strategy-proof radio spectrum auction mechanism in noncooperative wireless networks
-
F. Wu and N. Vaidya, "A Strategy-Proof Radio Spectrum Auction Mechanism in Noncooperative Wireless Networks, " in IEEE Transaction on Mobile Computing, vol. 12, no. 5, pp. 885-894, 2013.
-
(2013)
IEEE Transaction on Mobile Computing
, vol.12
, Issue.5
, pp. 885-894
-
-
Wu, F.1
Vaidya, N.2
-
38
-
-
84871966152
-
The exponential mechanism for social welfare: Private, truthful, and nearly optimal
-
Z. Huang and S. Kannan, "The exponential mechanism for social welfare: Private, truthful, and nearly optimal, " in FOCS 12, 2012.
-
(2012)
FOCS
, vol.12
-
-
Huang, Z.1
Kannan, S.2
|