Networks of Strategic Agents: Social Norms, Incentives and Learning
暂无分享,去创建一个
[1] Tao Mei,et al. Towards Cross-Domain Learning for Social Video Popularity Prediction , 2013, IEEE Transactions on Multimedia.
[2] Junlan Feng,et al. Robust Sentiment Detection on Twitter from Biased and Noisy Data , 2010, COLING.
[3] David A. Shamma,et al. Viral Actions: Predicting Video View Counts Using Synchronous Sharing Behaviors , 2011, ICWSM.
[4] John Langford,et al. The Epoch-Greedy Algorithm for Multi-armed Bandits with Side Information , 2007, NIPS.
[5] Kavé Salamatian,et al. An Approach to Model and Predict the Popularity of Online Contents with Explanatory Factors , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[6] Chen Tian,et al. Optimizing cost and performance for content multihoming , 2012, SIGCOMM '12.
[7] Pablo Rodriguez,et al. I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.
[8] Mihaela van der Schaar,et al. Distributed Online Learning in Social Recommender Systems , 2013, IEEE Journal of Selected Topics in Signal Processing.
[9] David Barber,et al. Online Learning from Finite Training Sets and Robustness to Input Bias , 1998, Neural Computation.
[10] H. Varian,et al. Predicting the Present with Google Trends , 2009 .
[11] E. Lazega. Introduction : Collegial Phenomenon : The Social Mechanisms of Cooperation Among Peers in a Corporate Law Partnership , 2001 .
[12] Dirk Bergemann,et al. Optimal pricing with recommender systems , 2006, EC '06.
[13] N. Kiyotaki,et al. On Money as a Medium of Exchange , 1989, Journal of Political Economy.
[14] Mihaela van der Schaar,et al. Token economy for online exchange systems , 2012, AAMAS.
[15] Brian D. Davison,et al. Predicting popular messages in Twitter , 2011, WWW.
[16] Mihaela van der Schaar,et al. Distributed Multi-Agent Online Learning Based on Global Feedback , 2015, IEEE Transactions on Signal Processing.
[17] Krishna P. Gummadi,et al. Predicting emerging social conventions in online social networks , 2012, CIKM.
[18] Joseph Y. Halpern,et al. Optimizing scrip systems: efficiency, crashes, hoarders, and altruists , 2007, EC '07.
[19] R. Axelrod. The Emergence of Cooperation among Egoists , 1981, American Political Science Review.
[20] Carlos Alós-Ferrer,et al. Dynamical Systems with a Continuum of Randomly Matched Agents , 1999 .
[21] Nicolò Cesa-Bianchi,et al. Combinatorial Bandits , 2012, COLT.
[22] Yutaka Matsuo,et al. Earthquake shakes Twitter users: real-time event detection by social sensors , 2010, WWW '10.
[23] Peter Auer,et al. Using Confidence Bounds for Exploitation-Exploration Trade-offs , 2003, J. Mach. Learn. Res..
[24] Glenn Ellison. Basins of Attraction, Long-Run Stochastic Stability, and the Speed of Step-by-Step Evolution , 2000 .
[25] Gabriele Camera,et al. Money, Credit and Banking , 2005, J. Econ. Theory.
[26] Mihaela van der Schaar,et al. Token System Design for Autonomic Wireless Relay Networks , 2013, IEEE Transactions on Communications.
[27] Vikram Krishnamurthy,et al. Quickest Detection POMDPs With Social Learning: Interaction of Local and Global Decision Makers , 2010, IEEE Transactions on Information Theory.
[28] Mubarak Shah,et al. High-level event recognition in unconstrained videos , 2013, International Journal of Multimedia Information Retrieval.
[29] Mihaela van der Schaar,et al. A Distributed Approach for Optimizing Cascaded Classifier Topologies in Real-Time Stream Mining Systems , 2010, IEEE Transactions on Image Processing.
[30] David A. Miller,et al. Enforcing Cooperation in Networked Societies , 2013 .
[31] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[32] Baochun Li,et al. Demand forecast and performance prediction in peer-assisted on-demand streaming systems , 2011, 2011 Proceedings IEEE INFOCOM.
[33] Cong Shen,et al. Silence is Gold: Strategic Interference Mitigation Using Tokens in Heterogeneous Small Cell Networks , 2015, IEEE Journal on Selected Areas in Communications.
[34] Ahmed Riahi-Belkaoui. The cultural shaping of accounting , 1995 .
[35] Ruilin Zhou,et al. Individual and Aggregate Real Balances in a Random Matching Model , 1996 .
[36] Daniel Pérez Palomar,et al. Alternative Distributed Algorithms for Network Utility Maximization: Framework and Applications , 2007, IEEE Transactions on Automatic Control.
[37] Narayana R. Kocherlakota,et al. The Two-Money Theorem , 2002 .
[38] Roi Blanco,et al. Hybrid models for future event prediction , 2011, CIKM '11.
[39] R. Merton. The Matthew Effect in Science , 1968, Science.
[40] Xueqi Cheng,et al. Popularity prediction in microblogging network: a case study on sina weibo , 2013, WWW.
[41] Bhaskar Krishnamachari,et al. Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations , 2010, IEEE/ACM Transactions on Networking.
[42] Ke Xu,et al. On popularity prediction of videos shared in online social networks , 2013, CIKM.
[43] Yiannis Kompatsiaris,et al. Enhancing video concept detection with the use of tomographs , 2013, 2013 IEEE International Conference on Image Processing.
[44] Song Wen,et al. Understanding video propagation in online social networks , 2012, 2012 IEEE 20th International Workshop on Quality of Service.
[45] Mihaela van der Schaar,et al. Learning relaying strategies in cellular D2D networks with token-based incentives , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[46] Thomas P. Hayes,et al. Stochastic Linear Optimization under Bandit Feedback , 2008, COLT.
[47] H. Vincent Poor,et al. Social learning and bayesian games in multiagent signal processing: how do local and global decision makers interact? , 2013, IEEE Signal Processing Magazine.
[48] A. Dixit,et al. Monopolistic competition and optimum product diversity , 1977 .
[49] Z. Neda,et al. Measuring preferential attachment in evolving networks , 2001, cond-mat/0104131.
[50] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[51] Nabil Amara,et al. The impact of transaction costs on the institutional structuration of collaborative academic research , 1998 .
[52] Joseph Y. Halpern,et al. Efficiency and nash equilibria in a scrip system for P2P networks , 2006, EC '06.
[53] Barry Bozeman,et al. The Impact of Research Collaboration on Scientific Productivity , 2005 .
[54] Mihaela van der Schaar,et al. A Rules-Based Approach for Configuring Chains of Classifiers in Real-Time Stream Mining Systems , 2009, EURASIP J. Adv. Signal Process..
[55] Mihaela van der Schaar,et al. A Game Theoretic Analysis of Incentives in Content Production and Sharing Over Peer-to-Peer Networks , 2009, IEEE Journal of Selected Topics in Signal Processing.
[56] Yong Tan,et al. Evaluation and design of online cooperative feedback mechanisms for reputation management , 2005, IEEE Transactions on Knowledge and Data Engineering.
[57] Chrysanthos Dellarocas,et al. Reputation Mechanism Design in Online Trading Environments with Pure Moral Hazard , 2005, Inf. Syst. Res..
[58] Ananthram Swami,et al. Distributed Algorithms for Learning and Cognitive Medium Access with Logarithmic Regret , 2010, IEEE Journal on Selected Areas in Communications.
[59] Elinor Ostrom,et al. tragedy of the commons , 2010 .
[60] Joseph M. Hellerstein,et al. Flux: an adaptive partitioning operator for continuous query systems , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[61] Mihaela van der Schaar,et al. Adaptive Topologic Optimization for Large-Scale Stream Mining , 2010, IEEE Journal of Selected Topics in Signal Processing.
[62] J. Walrand,et al. Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple plays-Part II: Markovian rewards , 1987 .
[63] Matthew Elliott,et al. A Network Approach to Public Goods , 2017, Journal of Political Economy.
[64] Michael Waldman,et al. Up-or-Out Contracts: A Signaling Perspective , 1990, Journal of Labor Economics.
[65] J. Gittins. Bandit processes and dynamic allocation indices , 1979 .
[66] John N. Tsitsiklis,et al. Linearly Parameterized Bandits , 2008, Math. Oper. Res..
[67] Wei Chu,et al. Contextual Bandits with Linear Payoff Functions , 2011, AISTATS.
[68] Augusto Ciuffoletti. Secure token passing at application level , 2010, Future Gener. Comput. Syst..
[69] Tao Zhu,et al. Noncash payment methods in a cashless economy , 2009 .
[70] Jussara M. Almeida,et al. Using early view patterns to predict the popularity of youtube videos , 2013, WSDM.
[71] W. Chou,et al. Social Media Use in the United States: Implications for Health Communication , 2009, Journal of medical Internet research.
[72] Bernardo A. Huberman,et al. Predicting the popularity of online content , 2008, Commun. ACM.
[73] Feng Wang,et al. Understand Instant Video Clip Sharing on Mobile Platforms: Twitter's Vine as a Case Study , 2014, NOSSDAV.
[74] Tai-Wei Hu,et al. Coalition‐Proof Trade and the Friedman Rule in the Lagos‐Wright Model , 2007, Journal of Political Economy.
[75] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[76] Miao Chen,et al. Toward Predicting Popularity of Social Marketing Messages , 2011, SBP.
[77] Darrell Duffie,et al. Existence of independent random matching , 2007 .
[78] Raghuram G. Rajan,et al. The Firm as a Dedicated Hierarchy: A Theory of the Origin and Growth of Firms , 1998 .
[79] Mihaela van der Schaar,et al. Conjectural Equilibrium in Multiuser Power Control Games , 2009, IEEE Transactions on Signal Processing.
[80] Rosemary Walker,et al. Empirical analysis of up-or-out rules for promotion policies , 2005 .
[81] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[82] John Langford,et al. Efficient Optimal Learning for Contextual Bandits , 2011, UAI.
[83] P. Whittle. Multi‐Armed Bandits and the Gittins Index , 1980 .
[84] Mihaela van der Schaar,et al. Finding It Now: Construction and Configuration of Networked Classifiers in Real-Time Stream Mining Systems , 2013, Handbook of Signal Processing Systems.
[85] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[86] A. Siow,et al. Tenure and Other Unusual Personnel Practices in Academia , 1998 .
[87] Matthew Rowe. Forecasting audience increase on YouTube , 2011 .
[88] Qing Zhao,et al. Learning in a Changing World: Restless Multiarmed Bandit With Unknown Dynamics , 2010, IEEE Transactions on Information Theory.
[89] Mihaela van der Schaar,et al. Distributed spectrum sensing in the presence of selfish users , 2013, 2013 5th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[90] Ricardo de O. Cavalcanti,et al. A Model of Private Bank-Note Issue , 1999 .
[91] B. O'Flaherty,et al. On the Job Screening, Up or Out Rules, and Firm Growth , 1992 .
[92] Qian Zhang,et al. Achieving cooperative spectrum sensing in wireless cognitive radio networks , 2009, MOCO.
[93] Mihaela van der Schaar,et al. Social Norm Design for Information Exchange Systems with Limited Observations , 2012, IEEE Journal on Selected Areas in Communications.
[94] Stephen A. Jarvis,et al. A Payment-based Incentive and Service Differentiation Mechanism for Peer-to-Peer Streaming Broadcast , 2006, 200614th IEEE International Workshop on Quality of Service.
[95] Wolfgang Kellerer,et al. Outtweeting the Twitterers - Predicting Information Cascades in Microblogs , 2010, WOSN.
[96] Ricardo de O. Cavalcanti,et al. Inside and outside Money as Alternative Media of Exchange , 1999 .
[97] M. Jackson,et al. Social Capital and Social Quilts: Network Patterns of Favor Exchange , 2011 .
[98] Jie Tang,et al. Citation count prediction: learning to estimate future citations for literature , 2011, CIKM '11.
[99] H. Vincent Poor,et al. Quickest Detection in Cognitive Radio: A Sequential Change Detection Framework , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[100] Daniela Puzzello,et al. Independent random matching , 2012 .
[101] István Hegedüs,et al. Gossip-based distributed stochastic bandit algorithms , 2013, ICML.
[102] William J. Bertin,et al. Publish or Perish: What the Competition Is Really Doing , 1992 .
[103] Mihaela van der Schaar,et al. Rating Protocols in Online Communities , 2014, TEAC.
[104] Aleksandrs Slivkins,et al. Contextual Bandits with Similarity Information , 2009, COLT.
[105] Michihiro Kandori. Social Norms and Community Enforcement , 1992 .
[106] Bernardo A. Huberman,et al. Predicting the Future with Social Media , 2010, Web Intelligence.
[107] H. Robbins,et al. Asymptotically efficient adaptive allocation rules , 1985 .
[108] Emin Gün Sirer,et al. KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .
[109] Lifeng Sun,et al. Guiding internet-scale video service deployment using microblog-based prediction , 2012, 2012 Proceedings IEEE INFOCOM.
[110] Ibrahim Matta,et al. Describing and forecasting video access patterns , 2011, 2011 Proceedings IEEE INFOCOM.
[111] R. Srikant,et al. Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.
[112] Wei Chen,et al. Combinatorial Multi-Armed Bandit: General Framework and Applications , 2013, ICML.
[113] Elizabeth A. Corley,et al. Scientists' collaboration strategies: implications for scientific and technical human capital , 2004 .
[114] Jeffrey K. MacKie-Mason,et al. Pricing Congestible Network Resources (Invited Paper) , 1995, IEEE J. Sel. Areas Commun..
[115] Tad Hogg,et al. Using a model of social dynamics to predict popularity of news , 2010, WWW '10.
[116] Michael Timmers,et al. On the Use of Reservoir Computing in Popularity Prediction , 2010, 2010 2nd International Conference on Evolving Internet.
[117] Manfred K. Warmuth,et al. The Weighted Majority Algorithm , 1994, Inf. Comput..
[118] Mihaela van der Schaar,et al. Incentivizing information sharing in networks , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[119] Mihaela van der Schaar,et al. Configuring Competing Classifier Chains in Distributed Stream Mining Systems , 2007, IEEE Journal of Selected Topics in Signal Processing.
[120] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[121] Gabriele Camera,et al. Money and Price Dispersion , 1998 .
[122] Wolfgang Nejdl,et al. How useful are your comments?: analyzing and predicting youtube comments and comment ratings , 2010, WWW '10.
[123] Ke Xu,et al. Video sharing in online social networks: measurement and analysis , 2012, NOSSDAV '12.
[124] Paul A. Pavlou,et al. Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..
[125] Konrad Podczeck,et al. On existence of rich Fubini extensions , 2010 .
[126] Aleksander Berentsen,et al. Money Inventories in Search Equilibrium , 2000 .
[127] Mihaela van der Schaar,et al. Rating systems for enhanced cyber-security investments , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[128] Mingyan Liu,et al. Online Learning of Rested and Restless Bandits , 2011, IEEE Transactions on Information Theory.