A High-Throughput Byzantine Fault-Tolerant Protocol
暂无分享,去创建一个
[1] Kenneth W. Shum,et al. Convergence of Iterative Waterfilling Algorithm for Gaussian Interference Channels , 2007, IEEE Journal on Selected Areas in Communications.
[2] Stephen S. Lavenberg,et al. Mean-Value Analysis of Closed Multichain Queuing Networks , 1980, JACM.
[3] Yair Frankel,et al. On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .
[4] Nicholas R. Jennings,et al. Decentralised coordination of low-power embedded devices using the max-sum algorithm , 2008, AAMAS.
[5] Edmund M. Yeh,et al. Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay Networks , 2007, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[6] Quanyan Zhu,et al. A constrained evolutionary Gaussian multiple access channel game , 2009, 2009 International Conference on Game Theory for Networks.
[7] J. Nash. THE BARGAINING PROBLEM , 1950, Classics in Game Theory.
[8] Rajarathnam Chandramouli,et al. Price dynamics in competitive agile spectrum access markets , 2007, IEEE Journal on Selected Areas in Communications.
[9] Koushik Kar,et al. Bandwidth allocation games under budget and access constraints , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[10] Stephen B. Wicker,et al. Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Vasilios A. Siris,et al. Resource control for elastic traffic in CDMA networks , 2002, MobiCom '02.
[12] Vincent Fleury,et al. About the equilibrium shape of fibred structures, and biological shapes. , 2004, Comptes rendus biologies.
[13] Y. S. Moon,et al. Wavelet based fingerprint liveness detection , 2005 .
[14] Dan Dobre,et al. Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[15] Milind Tambe,et al. Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.
[16] George D. Stamoulis,et al. Auction-Based Resource Reservation in 2.5/3G Networks , 2004, Mob. Networks Appl..
[17] N. Mandayam,et al. Demand responsive pricing and competitive spectrum allocation via a spectrum server , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[18] Wei Yu,et al. Iterative water-filling for Gaussian vector multiple-access channels , 2001, IEEE Transactions on Information Theory.
[19] P. Olver. Nonlinear Systems , 2013 .
[20] Meritxell Vinyals,et al. A Survey on Sensor Networks from a Multiagent Perspective , 2011, Comput. J..
[21] R. Srikant,et al. The marginal user principle for resource allocation in wireless networks , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[22] Zhu Han,et al. Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks: A Game-Theoretic Modeling Approach , 2009, IEEE Transactions on Mobile Computing.
[23] Nancy A. Lynch,et al. Consensus in the presence of partial synchrony , 1988, JACM.
[24] John Lane,et al. Byzantine replication under attack , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[25] Pierfrancesco La Mura. Game Networks , 2000, UAI.
[26] Marko Vukolic,et al. Abstractions for asynchronous distributed computing with malicious players , 2008 .
[27] Ramakrishna Kotla,et al. Zyzzyva: speculative byzantine fault tolerance , 2007, TOCS.
[28] Paolo Santi,et al. COMMIT: a sender-centric truthful and energy-efficient routing protocol for ad hoc networks with selfish nodes , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[29] K. J. Ray Liu,et al. Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation , 2008, IEEE Journal on Selected Areas in Communications.
[30] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[31] Boi Faltings,et al. Ensuring Privacy through Distributed Computation in Multiple-Depot Vehicle Routing Problems , 2010 .
[32] Amnon Meisels,et al. Asymmetric Distributed Constraint Optimization , 2009 .
[33] Francisco Facchinei,et al. Distributed Power Allocation With Rate Constraints in Gaussian Parallel Interference Channels , 2007, IEEE Transactions on Information Theory.
[34] Bart De Decker,et al. On Securely Scheduling a Meeting , 2001, SEC.
[35] Marius-Calin Silaghi. Hiding Absence of Solution for a Distributed Constraint Satisfaction Problem , 2005, FLAIRS Conference.
[36] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[37] Boi Faltings,et al. ABT with Asynchronous Reordering , 2001 .
[38] Jaideep Vaidya,et al. Privacy-preserving linear programming , 2009, SAC '09.
[39] Ching-Yao Huang,et al. Non-cooperative uplink power control in cellular radio systems , 1998, Wirel. Networks.
[40] John M. Cioffi,et al. Uniform power allocation in MIMO channels: a game-theoretic approach , 2003, IEEE Transactions on Information Theory.
[41] Holger Boche,et al. Nash bargaining and proportional fairness for log-convex utility sets , 2008, ICASSP 2008.
[42] K. J. Ray Liu,et al. Belief-Assisted Pricing for Dynamic Spectrum Allocation in Wireless Networks with Selfish Users , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[43] To-Yat Cheung,et al. Graph Traversal Techniques and the Maximum Flow Problem in Distributed Computation , 1983, IEEE Transactions on Software Engineering.
[44] Amnon Meisels,et al. Asynchronous Forward-checking for DisCSPs , 2007, Constraints.
[45] Adrian Petcu. FRODO: A FRamework for Open/Distributed constraint Optimization , 2006 .
[46] J. L. Wayman,et al. Best practices in testing and reporting performance of biometric devices. , 2002 .
[47] Anthony Ephremides,et al. A game-theoretic look at simple relay channel , 2006, Wirel. Networks.
[48] Michael Still. The Definitive Guide to ImageMagick , 2005 .
[49] I. Glicksberg. A FURTHER GENERALIZATION OF THE KAKUTANI FIXED POINT THEOREM, WITH APPLICATION TO NASH EQUILIBRIUM POINTS , 1952 .
[50] Boi Faltings,et al. Coordinating Logistics Operations with Privacy Guarantees , 2011, IJCAI.
[51] Christian Cachin,et al. Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.
[52] Jean-Daniel Boissonnat,et al. Incremental construction of the delaunay triangulation and the delaunay graph in medium dimension , 2009, SCG '09.
[53] Johan Hultell,et al. Cooperative and non-cooperative wireless access : Resource and infrastructure sharing regimes , 2008 .
[54] Michael L. Honig,et al. Two-cell utility-based resource allocation for a CDMA voice service , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[55] Sergio Barbarossa,et al. IEEE TRANSACTIONS ON SIGNAL PROCESSING (ACCEPTED) 1 The MIMO Iterative Waterfilling Algorithm , 2022 .
[56] Krzysztof Kuchcinski,et al. JaCoP - Java Constraint Programming Solver , 2013, CP 2013.
[57] George Kesidis,et al. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.
[58] Boi Faltings,et al. Privacy-Preserving Multi-agent Constraint Satisfaction , 2009, 2009 International Conference on Computational Science and Engineering.
[59] Milind Tambe,et al. Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.
[60] Sergio Barbarossa,et al. Potential Games: A Framework for Vector Power Control Problems With Coupled Constraints , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[61] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[62] Makoto Yokoo,et al. Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..
[63] Leonardo Badia,et al. Radio Resource Management with Utility and Pricing for Wireless LAN Hot-Spots , 2005, Wirel. Pers. Commun..
[64] Milind Tambe,et al. Distributed Algorithms for DCOP: A Graphical-Game-Based Approach , 2004, PDCS.
[65] Ephraim Zehavi,et al. Game theory and the frequency selective interference channel - A tutorial , 2009, ArXiv.
[66] Peter Marbach,et al. Cooperation in wireless ad hoc networks: a market-based approach , 2005, IEEE/ACM Transactions on Networking.
[67] M. Schulz,et al. Ninhydrin-dyed latent fingerprints as a DNA source in a murder case. , 2004, Journal of clinical forensic medicine.
[68] Cristina Comaniciu,et al. A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha , 2008, IEEE Transactions on Wireless Communications.
[69] Miguel Correia,et al. Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[70] Patrick Maillé,et al. Analysis of Price Competition in a Slotted Resource Allocation Game , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[71] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[72] Martin Drahanský. Experiments with Skin Resistance and Temperature for Liveness Detection , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[73] Weixiong Zhang,et al. Distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks , 2005, Artif. Intell..
[74] Nico M. van Dijk. Queueing networks and product forms - a systems approach , 1993, Wiley-Interscience series in systems and optimization.
[75] Zhu Han,et al. Physical layer security: Coalitional games for distributed cooperation , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[76] Amnon Meisels,et al. Measuring Distributed Constraint Optimization algorithms , 2008 .
[77] Jean-Pierre Hubaux,et al. Wireless Operators in a Shared Spectrum , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[78] Amir Leshem,et al. Iterative power pricing for distributed spectrum coordination in DSL , 2009, IEEE Transactions on Communications.
[79] T. Basar,et al. Differentiated Internet pricing using a hierarchical network game model , 2004, Proceedings of the 2004 American Control Conference.
[80] Amnon Meisels,et al. Distributed Search by Constrained Agents: Algorithms, Performance, Communication , 2007, Advanced Information and Knowledge Processing.
[81] Amnon Meisels,et al. Concurrent search for distributed CSPs , 2006, Artif. Intell..
[82] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[83] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[84] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[85] Johan Hultell,et al. Decentralized Market-Based Radio Resource Management in Multi-Network Environments , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[86] B. Grosz,et al. SSDPOP : Using Secret Sharing to Improve the Privacy of DCOP , 2007 .
[87] Guan-Ming Su,et al. Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks , 2009, EURASIP J. Adv. Signal Process..
[88] Pedro Meseguer,et al. Distributed Forward Checking May Lie for Privacy , 2006, CSCLP.
[89] Milind Tambe,et al. Quality guarantees for region optimal DCOP algorithms , 2011, AAMAS.
[90] G. I. Kustova,et al. From the author , 2019, Automatic Documentation and Mathematical Linguistics.
[91] Klara Nahrstedt,et al. iPass: an incentive compatible auction scheme to enable packet forwarding service in MANET , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[92] G. Clarke,et al. Scheduling of Vehicles from a Central Depot to a Number of Delivery Points , 1964 .
[93] Y. Fukui,et al. Biometric Identity Verification Using Intra-Body Propagation Signal , 2007, 2007 Biometrics Symposium.
[94] N. Mandayam,et al. Coalitional Games in Receiver Cooperation for Spectrum Sharing , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[95] Narayan B. Mandayam,et al. Coalitions in Cooperative Wireless Networks , 2008, IEEE Journal on Selected Areas in Communications.
[96] G. de Jager,et al. A survey of point pattern matching techniques and a new approach to point pattern recognition , 1992, Proceedings of the 1992 South African Symposium on Communications and Signal Processing.
[97] Ness B. Shroff,et al. Utility-based power control in cellular wireless systems , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[98] Patrick Maillé,et al. Price War with Partial Spectrum Sharing for Competitive Wireless Service Providers , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[99] Dusit Niyato,et al. A game theoretic analysis of service competition and pricing in heterogeneous wireless access networks , 2008, IEEE Transactions on Wireless Communications.
[100] Tadeusz Czachórski,et al. Performance evaluation of fork and join synchronization primitives , 1987, Acta Informatica.
[101] EDDIE KOHLER,et al. The click modular router , 2000, TOCS.
[102] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[103] Bir Bhanu,et al. Fingerprint Indexing Based on Novel Features of Minutiae Triplets , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[104] Wei Li,et al. Privacy-preserving horizontally partitioned linear programs with inequality constraints , 2013, Optim. Lett..
[105] Sylvain Piechowiak,et al. A complete algorithm for DisCSP : Distributed Backtracking with Sessions ( DBS ) , 2009 .
[106] Marius-Calin Silaghi,et al. Asynchronous Search with Aggregations , 2000, AAAI/IAAI.
[107] Serge Vaudenay,et al. Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.
[108] Nancy A. Lynch,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[109] Qian Zhang,et al. Competitions and dynamics of duopoly wireless service providers in dynamic spectrum market , 2008, MobiHoc '08.
[110] Jean-Yves Le Boudec. Performance Evaluation of Computer and Communication Systems , 2010, Computer and communication sciences.
[111] Radoslaw Szymanek,et al. FRODO 2.0: An Open-Source Framework for Distributed Constraint Optimization , 2009, IJCAI 2009.
[112] Stephen B. Wicker,et al. Selfish users in Aloha: a game-theoretic approach , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[113] Andrew A. Marino,et al. Laplace Plane Analysis of Skin Impedance: A Preliminary Investigation , 1978 .
[114] Bengt Holmstrom,et al. GROVES' SCHEME ON RESTRICTED DOMAINS , 1979 .
[115] Victor Lesser,et al. A Mediation Based Protocol for Distributed Constraint Satisfaction , 2003 .
[116] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[117] Kin K. Leung,et al. Multi-objective power control and signature sequence adaptation for synchronous cdma systems - a game-theoretic viewpoint , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[118] Jerry R. Green,et al. Characterization of Satisfactory Mechanisms for the Revelation of Preferences for Public Goods , 1977 .
[119] Eitan Altman,et al. A survey on networking games in telecommunications , 2006, Comput. Oper. Res..
[120] Daphne Koller,et al. Multi-agent algorithms for solving graphical games , 2002, AAAI/IAAI.
[121] Richard J. La,et al. Auction mechanism for spectrum allocation and profit sharing , 2009, 2009 International Conference on Game Theory for Networks.
[122] Makoto Yokoo,et al. When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty , 2010, AAMAS.
[123] Wei Yu,et al. Distributed multiuser power control for digital subscriber lines , 2002, IEEE J. Sel. Areas Commun..
[124] Cem U. Saraydar,et al. Power control in a multicell CDMA data system using pricing , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).
[125] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[126] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[127] Klara Nahrstedt,et al. Price-based resource allocation in wireless ad hoc networks , 2003, IWQoS'03.
[128] Mihaela van der Schaar,et al. Learning for Dynamic Bidding in Cognitive Radio Resources , 2007, ArXiv.
[129] Luis Ceze,et al. Deterministic Process Groups in dOS , 2010, OSDI.
[130] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[131] Silvia Giordano,et al. Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .
[132] Erik G. Larsson,et al. Competition Versus Cooperation on the MISO Interference Channel , 2008, IEEE Journal on Selected Areas in Communications.
[133] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[134] Rachid El Azouzi,et al. Slotted Aloha as a Stochastic Game with Partial Information , 2003 .
[135] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[136] Boi Faltings,et al. Secure Combinatorial Optimization Simulating DFS Tree-Based Variable Elimination , 2006, AI&M.
[137] David J. Goodman,et al. Power control for wireless data , 2000, IEEE Wirel. Commun..
[138] Sen Hu,et al. Efficient system-enforced deterministic parallelism , 2010, OSDI.
[139] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[141] Sajal K. Das,et al. ARC: an integrated admission and rate control framework for competitive wireless CDMA data networks using noncooperative games , 2005, IEEE Transactions on Mobile Computing.
[142] Stephen B. Wicker,et al. Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..
[143] M. Roggendorf. Dynamic pricing of wireless network resources in a competitive provider setting , 2008 .
[144] Julie Thorpe,et al. Pass-thoughts: authenticating with our minds , 2005, NSPW '05.
[145] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[146] Jon Crowcroft,et al. Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.
[147] V. Georgiev. Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .
[148] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[149] Yiannis Tsiounis,et al. On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.
[150] Nilo Casimiro Ericsson,et al. Revenue Maximization in Resource Allocation : Applications in Wireless Communication Networks , 2004 .
[151] Jean-Pierre Hubaux,et al. Border Games in Cellular Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[152] Kin Kwong Leung,et al. Distributed sequence adaptation for capacity maximization of DS-CDMA systems , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[153] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[154] Boi Faltings,et al. Asynchronous Forward Bounding (AFB): Implementation and Performance Experiments , 2011 .
[155] A. Leshem,et al. Distributed coordination of spectrum and the prisoner~s dilemma , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[156] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[157] Gustavo de Veciana,et al. Cooperation and decision-making in a wireless multi-provider setting , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[158] David Tse,et al. Spectrum Sharing Between Wireless Networks , 2008, IEEE/ACM Transactions on Networking.
[159] Jean C. Walrand,et al. Base Station Association Game in Multi-Cell Wireless Networks (Special Paper) , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[160] Amnon Meisels,et al. Concurrent Dynamic Backtracking for Distributed CSPs , 2004, CP.
[161] Flavio Paiva Junqueira,et al. Scalable Agreement: Toward Ordering as a Service , 2010, HotDep.
[162] Scott Shenker,et al. General Characterization Parameters for Integrated Service Network Elements , 1997, RFC.
[163] Minghua Chen,et al. Optimal resource allocation for OFDM uplink communication: A primal-dual approach , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[164] Chuck Lever,et al. Scalable Network I/O in Linux , 2000, USENIX Annual Technical Conference, FREENIX Track.
[165] Marius-Calin Silaghi,et al. Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..
[166] Gunter Bolch,et al. Queueing Networks and Markov Chains , 2005 .
[167] Zhu Han,et al. A Distributed Merge and Split Algorithm for Fair Cooperation in Wireless Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.
[168] L. Dasilva,et al. Node Participation in Ad Hoc and Peer-to-Peer Networks: A Game-Theoretic Formulation , 2004 .
[169] Christian Bessiere,et al. Asynchronous Inter-Level Forward-Checking for DisCSPs , 2009, CP.
[170] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[171] Roie Zivan,et al. Distributed Constraint Optimization for Large Teams of Mobile Sensing Agents , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[172] Narayan B. Mandayam,et al. Pricing and power control for joint network-centric and user-centric radio resource management , 2004, IEEE Transactions on Communications.
[173] Holger Boche,et al. Non-symmetric Nash bargaining solution for resource allocation in wireless networks and connection to interference calculus , 2007, 2007 15th European Signal Processing Conference.
[174] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[175] David C. Parkes,et al. Iterative combinatorial auctions: achieving economic and computational efficiency , 2001 .
[176] Makoto Yokoo,et al. Asynchronous Weak-commitment Search for Solving Distributed Constraint Satisfaction Problems , 1995, CP.
[177] S. Wittevrongel,et al. Queueing Systems , 2019, Introduction to Stochastic Processes and Simulation.
[178] Milind Tambe,et al. Asynchronous algorithms for approximate distributed constraint optimization with quality bounds , 2010, AAMAS.
[179] Michael L. Honig,et al. Forward-link CDMA resource allocation based on pricing , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[180] Pedro Meseguer,et al. Distributed Forward Checking , 2003, CP.
[181] Yong Huat Chew,et al. Decentralized bit, subcarrier and power allocation with interference avoidance in multicell OFDMA systems using game theoretic approach , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[182] James R. Jackson,et al. Jobshop-Like Queueing Systems , 2004, Manag. Sci..
[183] Zhi-Quan Luo,et al. Analysis of Iterative Waterfilling Algorithm for Multiuser Power Control in Digital Subscriber Lines , 2006, EURASIP J. Adv. Signal Process..
[184] Amnon Meisels,et al. Completeness and Performance Of The APO Algorithm , 2008, J. Artif. Intell. Res..
[185] Boi Faltings,et al. M-DPOP: Faithful Distributed Implementations of Efficient Social Choice Problems , 2008 .
[186] Boi Faltings,et al. A-DPOP: Approximations in Distributed Optimization , 2005 .
[187] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[188] Bin Chen,et al. Cognitive Radio Channel Allocation Using Auction Mechanisms , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[189] Zhu Han,et al. Fair multiuser channel allocation for OFDMA networks using Nash bargaining solutions and coalitions , 2005, IEEE Transactions on Communications.
[190] Carmel Domshlak,et al. Sensor networks and distributed CSP: communication, computation and complexity , 2005, Artif. Intell..
[191] Amnon Meisels,et al. Concurrent Forward Bounding for DCOPs , 2010 .
[192] Refik Molva,et al. Analysis of coalition formation and cooperation strategies in mobile ad hoc networks , 2005, Ad Hoc Networks.
[193] Serge Vaudenay. A classical introduction to cryptography - applications for communications security , 2005 .
[194] Yoav Shoham,et al. Towards a universal test suite for combinatorial auction algorithms , 2000, EC '00.
[195] Robert P. Gilles,et al. On the Role of Game Theory in the Analysis of Software Radio Networks , 2002 .
[196] Stephanie Schuckers,et al. Time-series detection of perspiration as a liveness test in fingerprint devices , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[197] Jianwei Huang,et al. Competition of wireless providers for atomic users: Equilibrium and social optimality , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[198] Amnon Meisels,et al. Asynchronous Forward-Bounding for Distributed Constraints Optimization , 2006, ECAI.
[199] A. Lee Swindlehurst,et al. Cooperative Power Scheduling for Wireless MIMO Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[200] Cem U. Saraydar,et al. Efficient power control via pricing in wireless data networks , 2002, IEEE Trans. Commun..
[201] Makoto Yokoo,et al. Nogood based asynchronous distributed optimization (ADOPT ng) , 2006, AAMAS '06.
[202] Xiang-Yang Li,et al. Truthful multicast routing in selfish wireless networks , 2004, MobiCom '04.
[203] Yann Chevaleyre,et al. Issues in Multiagent Resource Allocation , 2006, Informatica.
[204] Zhu Han,et al. Power minimization for multi-cell OFDM networks using distributed non-cooperative game approach , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[205] Shamik Sengupta,et al. Dynamic pricing for service provisioning and network selection in heterogeneous networks , 2009, Phys. Commun..
[206] Makoto Yokoo,et al. Distributed Private Constraint Optimization , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[207] Marc Moonen,et al. Autonomous Spectrum Balancing for Digital Subscriber Lines , 2007, IEEE Transactions on Signal Processing.
[208] Mihaela van der Schaar,et al. Bargaining Strategies for Networked Multimedia Resource Management , 2007, IEEE Transactions on Signal Processing.
[209] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[210] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[211] Makoto Yokoo,et al. Distributed constraint satisfaction for formalizing distributed problem solving , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.
[212] Kaveh Pahlavan,et al. Wireless Multimedia Network Technologies , 2013 .
[213] Keith S. Decker,et al. Coordination for uncertain outcomes using distributed neighbor exchange , 2010, AAMAS.
[214] Michael K. Reiter,et al. Fault-scalable Byzantine fault-tolerant services , 2005, SOSP '05.
[215] K. Mani Chandy,et al. Open, Closed, and Mixed Networks of Queues with Different Classes of Customers , 1975, JACM.
[216] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[217] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[218] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[219] Russell Bent,et al. The Value of Consensus in Online Stochastic Scheduling , 2004, ICAPS.
[220] Hesham El Gamal,et al. The Water-Filling Game in Fading Multiple-Access Channels , 2005, IEEE Transactions on Information Theory.
[221] R. Aumann. Subjectivity and Correlation in Randomized Strategies , 1974 .
[222] Milind Tambe,et al. Taking DCOP to the real world: efficient complete solutions for distributed multi-event scheduling , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[223] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[224] Michel Gendreau,et al. Metaheuristics for the Vehicle Routing Problem and Its Extensions: A Categorized Bibliography , 2008 .
[225] Cem U. Saraydar,et al. Pricing and power control in a multicell wireless data network , 2001, IEEE J. Sel. Areas Commun..
[226] Rachid Guerraoui,et al. Throughput optimal total order broadcast for cluster environments , 2010, TOCS.
[227] Jie Gao,et al. Game Theoretic Solutions for Precoding Strategies over the Interference Channel , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[228] Marie Sandström. Liveness Detection in Fingerprint Recognition Systems , 2004 .
[229] A. Kumar,et al. A New Method for Fingerprint Antispoofing using Pulse Oxiometry , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[230] J. Walrand,et al. WiFi access point pricing as a dynamic game , 2006, IEEE/ACM Transactions on Networking.
[231] Boi Faltings,et al. Privacy Guarantees through Distributed Constraint Satisfaction , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[232] Boi Faltings,et al. E[DPOP]: Distributed Constraint Optimization under Stochastic Uncertainty using Collaborative Sampling , 2009, IJCAI 2009.
[233] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[234] Adi Shamir,et al. How to share a secret , 1979, CACM.
[235] Robert N. Lass,et al. DCOPolis : A Framework for Simulating and Deploying Distributed Constraint Optimization Algorithms , 2007 .
[236] Milind Tambe,et al. Quality Guarantees on k-Optimal Solutions for Distributed Constraint Optimization Problems , 2007, IJCAI.
[237] Alessandra Lumini,et al. Can Fingerprints be Reconstructed from ISO Templates? , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.
[238] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[239] Sangmin Lee,et al. Upright cluster services , 2009, SOSP '09.
[240] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[241] K.J.R. Liu,et al. Game theoretical mechanism design methods , 2008, IEEE Signal Processing Magazine.
[242] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[243] Qiang Tang,et al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.
[244] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[245] Jaihie Kim,et al. Aliveness Detection of Fingerprints using Multiple Static Features , 2007 .
[246] Zhu Han,et al. Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks , 2009, IEEE INFOCOM 2009.
[247] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[248] Victor R. Lesser,et al. Solving distributed constraint optimization problems using cooperative mediation , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[249] Leslie Lamport,et al. Lower bounds for asynchronous consensus , 2006, Distributed Computing.
[250] Boi Faltings,et al. Distributed Constraint Optimization Under Stochastic Uncertainty , 2011, AAAI.
[251] K. J. Ray Liu,et al. An auction-based framework for multimedia streaming over cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[252] Sennur Ulukus,et al. Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.
[253] K. J. Ray Liu,et al. A scalable collusion-resistant multi-winner cognitive spectrum auction game , 2009, IEEE Transactions on Communications.
[254] Mérouane Debbah,et al. Power allocation games for mimo multiple access channels with coordination , 2009, IEEE Transactions on Wireless Communications.
[255] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[256] Rida A. Bazzi,et al. Matrix Signatures: From MACs to Digital Signatures in Distributed Systems , 2008, DISC.
[257] George Bebis,et al. Fingerprint identification using Delaunay triangulation , 1999, Proceedings 1999 International Conference on Information Intelligence and Systems (Cat. No.PR00446).
[258] Haitao Zheng,et al. A General Framework for Wireless Spectrum Auctions , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[259] Yoav Tock,et al. Dr. multicast: Rx for data center communication scalability , 2010, EuroSys '10.
[260] Jeffrey C. Mogul,et al. Scalable Kernel Performance for Internet Servers Under Realistic Loads , 1998, USENIX Annual Technical Conference.
[261] Allen B. MacKenzie,et al. A game theory perspective on interference avoidance , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[262] M. Drahansky,et al. Liveness Detection based on Fine Movements of the Fingertip Surface , 2006, 2006 IEEE Information Assurance Workshop.
[263] Zhu Han,et al. Auction-Based Resource Allocation for Cooperative Communications , 2008, IEEE Journal on Selected Areas in Communications.
[264] Chao Liang,et al. Power Management in MIMO Ad Hoc Networks: A Game-Theoretic Approach , 2007, IEEE Transactions on Wireless Communications.
[265] Eitan Altman,et al. Asymmetric delay in evolutionary games , 2007, VALUETOOLS.
[266] Michael P. Wellman,et al. Constraint satisfaction algorithms for graphical games , 2007, AAMAS '07.
[267] N. Bonneau,et al. Non-Atomic Games for Multi-User Systems , 2007, IEEE J. Sel. Areas Commun..
[268] Ibrahim Sogukpinar,et al. Fingerprint Hardening with Randomly Selected Chaff Minutiae , 2007, CAIP.
[269] Michael L. Honig,et al. Distributed interference compensation for wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[270] Niki Pissinou,et al. Resource allocation based on pricing for wireless multimedia networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[271] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[272] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[273] G S Sodhi,et al. Fingermarks detection by eosin-blue dye. , 2001, Forensic science international.
[274] Atul Singh,et al. BFT Protocols Under Fire , 2008, NSDI.
[275] Wei-Min Shen,et al. A Dynamic Distributed Constraint Satisfaction Approach to Resource Allocation , 2001, CP.
[276] Andrea J. Goldsmith,et al. Competition in Wireless Systems via Bayesian Interference Games , 2007, ArXiv.
[277] Christian Bessiere,et al. Asynchronous backtracking without adding links: a new member in the ABT family , 2005, Artif. Intell..
[278] Boi Faltings,et al. Coordinating Agent Plans Through Distributed Constraint Optimization , 2008 .
[279] Michael L. Honig,et al. Single-cell forward link power allocation using pricing in wireless networks , 2004, IEEE Transactions on Wireless Communications.
[280] John C. S. Lui,et al. A game-theoretic analysis of the implications of overlay network traffic on ISP peering , 2008, Comput. Networks.
[281] Boi Faltings,et al. A Scalable Method for Multiagent Constraint Optimization , 2005, IJCAI.
[282] Boi Faltings,et al. S-DPOP: Superstabilizing, Fault-containing Multiagent Combinatorial Optimization , 2005, AAAI 2005.
[283] Dejan Kostic,et al. Towards a cost-effective networking testbed , 2010, OPSR.
[284] Roy D. Yates,et al. Service provider competition and pricing for dynamic spectrum allocation , 2009, 2009 International Conference on Game Theory for Networks.
[285] Dusit Niyato,et al. Modeling User Churning Behavior in Wireless Networks Using Evolutionary Game Theory , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[286] Alan L. Cox,et al. Optimizing network virtualization in Xen , 2006 .
[287] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[288] Billy E. Gillett,et al. A Heuristic Algorithm for the Vehicle-Dispatch Problem , 1974, Oper. Res..
[289] Francesca Rossi,et al. Multi‐Agent Constraint Systems with Preferences: Efficiency, Solution Quality, and Privacy Loss , 2004, Comput. Intell..
[290] Nicholas R. Jennings,et al. U-GDL: A decentralised algorithm for DCOPs with Uncertainty , 2011 .
[291] Paramvir Bahl,et al. White space networking with wi-fi like connectivity , 2009, SIGCOMM '09.
[292] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[293] P. Marbach,et al. Wireless Social Community Networks: A Game-Theoretic Analysis , 2008, 2008 IEEE International Zurich Seminar on Communications.
[294] Jens Zander,et al. Jamming in slotted ALOHA multihop packet radio networks , 1991, IEEE Trans. Commun..
[295] Fernando Pedone,et al. Ring Paxos: A high-throughput atomic broadcast protocol , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[296] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[297] Zhu Han,et al. A Game-Based Self-Organizing Uplink Tree for VoIP Services in IEEE 802.16j Networks , 2009, 2009 IEEE International Conference on Communications.
[298] Mung Chiang,et al. Balancing supply and demand of bandwidth in wireless cellular networks: utility maximization over powers and rates , 2004, IEEE INFOCOM 2004.
[299] Erik G. Larsson,et al. The MISO interference channel from a game-theoretic perspective: A combination of selfishness and altruism achieves pareto optimality , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[300] Michael L. Honig,et al. Two-cell power allocation for downlink CDMA , 2004, IEEE Transactions on Wireless Communications.
[301] Leslie Lamport,et al. Distributed snapshots: determining global states of distributed systems , 1985, TOCS.
[302] J. Ben Atkinson,et al. An Introduction to Queueing Networks , 1988 .
[303] Zhisheng Niu,et al. Joint power and rate control for wireless ad hoc networks: a game-theoretical approach with step-up pricing , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[304] Olvi L. Mangasarian. Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..
[305] Mohammad Hayajneh,et al. Distributed joint rate and power control game-theoretic algorithms for wireless data , 2004, IEEE Communications Letters.
[306] Dusit Niyato,et al. A Game-Theoretic Approach to Competitive Spectrum Sharing in Cognitive Radio Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[307] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[308] G. S. Sodhi,et al. Powder method for detecting latent fingerprints: a review. , 2001, Forensic science international.
[309] Kin K. Leung,et al. On the stability of distributed sequence adaptation for cellular asynchronous DS-CDMA systems , 2003, IEEE Trans. Inf. Theory.
[310] Claudiu Danilov,et al. The Spread Toolkit: Architecture and Performance , 2004 .
[311] Steven Fortune,et al. A sweepline algorithm for Voronoi diagrams , 1986, SCG '86.
[312] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[313] S. Lasaulce,et al. K-player Bayesian waterfilling game for fading multiple access channels , 2009, 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[314] John Musacchio,et al. Game Theoretic Modeling of WiFi Pricing , 2003 .
[315] Makoto Yokoo,et al. The distributed breakout algorithms , 2005, Artif. Intell..
[316] Mingyan Liu,et al. Revenue generation for truthful spectrum auction in dynamic spectrum access , 2009, MobiHoc '09.
[317] Roman Barták,et al. Constraint Processing , 2009, Encyclopedia of Artificial Intelligence.
[318] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[319] Meritxell Vinyals,et al. Divide-and-coordinate: DCOPs by agreement , 2010, AAMAS.
[320] Amnon Meisels,et al. Asynchronous Forward Bounding for Distributed COPs , 2014, J. Artif. Intell. Res..
[321] Mérouane Debbah,et al. Power allocation game for fading MIMO multiple access channels with antenna correlation , 2007, ValueTools '07.
[322] Yi Chen,et al. Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features , 2007 .
[323] Meritxell Vinyals,et al. Constructing a unifying theory of dynamic programming DCOP algorithms via the generalized distributive law , 2010, Autonomous Agents and Multi-Agent Systems.
[324] Henrik I. Christensen,et al. A game theoretic model for management of mobile sensors , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.
[325] Denis Praca,et al. From smart cards to smart objects: the road to new smart technologies , 2001, Comput. Networks.
[326] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[327] Eitan Altman,et al. CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.
[328] M. Yokoo,et al. Distributed Breakout Algorithm for Solving Distributed Constraint Satisfaction Problems , 1996 .
[329] Vahab S. Mirrokni,et al. On spectrum sharing games , 2004, PODC '04.
[330] Valtteri Niemi,et al. Privacy-preserving activity scheduling on mobile devices , 2011, CODASPY '11.
[331] Tansu Alpcan,et al. A hybrid systems model for power control in multicell wireless data networks , 2004, Perform. Evaluation.
[332] Josep Domingo-Ferrer,et al. Smart Card Research and Advanced Applications , 2000, IFIP — The International Federation for Information Processing.
[333] Michael L. Littman,et al. Graphical Models for Game Theory , 2001, UAI.
[334] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[335] Ness B. Shroff,et al. Utility maximization for communication networks with multipath routing , 2006, IEEE Transactions on Automatic Control.
[336] Eitan Altman,et al. Non-cooperative Forwarding in Ad-Hoc Networks , 2005, NETWORKING.
[337] Xiaolei Ma,et al. Vehicle Routing Problem , 2013 .
[338] M. Utku Ünver,et al. Increasing the Opportunity of Live Kidney Donation by Matching for Two- and Three-Way Exchanges , 2006, Transplantation.
[339] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[340] Mark Handley,et al. Towards high performance virtual routers on commodity hardware , 2008, CoNEXT '08.
[341] Erkay Savas,et al. Impossibility of unconditionally secure scalar products , 2009, Data Knowl. Eng..
[342] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[343] Teng Joon Lim,et al. Soft handoffs in CDMA mobile systems , 1997, IEEE Wirel. Commun..
[344] Makoto Yokoo,et al. Resource Constrained Distributed Constraint Optimization with Virtual Variables , 2008, AAAI.
[345] Peter Marbach,et al. Downlink resource allocation and pricing for wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[346] Makoto Yokoo,et al. Distributed Partial Constraint Satisfaction Problem , 1997, CP.
[347] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[348] W. J. Gordon,et al. Closed Queuing Systems with Exponential Servers , 1967, Oper. Res..
[349] Wei-Yun Yau,et al. Fake Finger Detection by Finger Color Change Analysis , 2007, ICB.
[350] Makoto Yokoo,et al. A quantified distributed constraint optimization problem , 2010, AAMAS.
[351] Jeffrey H. Reed,et al. A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks , 2007 .
[352] M. Chatterjee,et al. An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[353] Frank Kelly,et al. Reversibility and Stochastic Networks , 1979 .
[354] Mark Klein,et al. Auctions and bidding: A guide for computer scientists , 2011, CSUR.
[355] Mokshay M. Madiman,et al. Cores of Cooperative Games in Information Theory , 2008, EURASIP J. Wirel. Commun. Netw..
[356] Rahul Jain,et al. Spectrum Sharing through Contracts , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[357] Richard J. La,et al. DIMACS Series in Discrete Mathematics and Theoretical Computer Science A Game-theoretic Look at the Gaussian Multiaccess Channel , 2022 .
[358] David J. Goodman,et al. Power control for wireless data based on utility and pricing , 1998, Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361).
[359] Anil K. Jain,et al. Biometric authentication : First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004 : proceedings , 2004 .
[360] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[361] O. Simeone,et al. A Game-Theoretic View on the Interference Channel with Random Access , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[362] Daesung Moon,et al. Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.
[363] Michael L. Honig,et al. Auction-Based Spectrum Sharing , 2006, Mob. Networks Appl..
[364] Katerina J. Argyraki,et al. RouteBricks: exploiting parallelism to scale software routers , 2009, SOSP '09.
[365] Jean-François Mainguet,et al. Fingerprint recognition based on silicon chips , 2000, Future Gener. Comput. Syst..
[366] Stephen Fitzpatrick,et al. An Experimental Assessment of a Stochastic, Anytime, Decentralized, Soft Colourer for Sparse Graphs , 2001, SAGA.
[367] Ephraim Zehavi,et al. Cooperative Game Theory and the Gaussian Interference Channel , 2007, IEEE Journal on Selected Areas in Communications.
[368] Boi Faltings,et al. MB-DPOP: A New Memory-Bounded Algorithm for Distributed Optimization , 2007, IJCAI.
[369] Demosthenis Teneketzis,et al. An Externalities-Based Decentralized Optimal Power Allocation Algorithm for Wireless Networks , 2009, IEEE/ACM Transactions on Networking.
[370] Christian Cachin,et al. State Machine Replication with Byzantine Faults , 2010, Replication.
[371] F. Jondral,et al. Dynamic and local combined pricing, allocation and billing system with cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[372] Florian Kerschbaum. Computation on Randomized Data , 2011 .
[373] G.D. Stamoulis,et al. Auction-based resource allocation in UMTS high speed downlink packet access (HSDPA) , 2005, Next Generation Internet Networks, 2005.
[374] M. Chatterjee,et al. An Economic Framework for Dynamic Spectrum Access and Service Pricing , 2009, IEEE/ACM Transactions on Networking.
[375] Umberto Spagnolini,et al. A Game-Theoretic Approach to Decentralized Interference-Avoidance Scheduling for Cellular Systems: Algorithm and Equilibria , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[376] Xinbing Wang,et al. A game approach for multi-channel allocation in multi-hop wireless networks , 2008, MobiHoc '08.
[377] Yi Zhao,et al. Fairness based resource allocation for uplink OFDMA systems , 2008 .
[378] John M. Cioffi,et al. SPC09-6: Band-Preference Dynamic Spectrum Management in a DSL Environment , 2006, IEEE Globecom 2006.
[379] Pedro Meseguer,et al. Cluster Tree Elimination for Distributed Constraint Optimization with Quality Guarantees , 2010, Fundam. Informaticae.
[380] Zhu Han,et al. Network Formation Games for Distributed Uplink Tree Construction in IEEE 802.16J Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[381] Levente Buttyán,et al. Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[382] H. Vincent Poor,et al. An energy-efficient approach to power control and receiver design in wireless data networks , 2005, IEEE Transactions on Communications.
[383] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[384] Ephraim Zehavi,et al. Bargaining Over the Interference Channel , 2006, 2006 IEEE International Symposium on Information Theory.
[385] Walid Saad,et al. Author manuscript, published in "IEEE Transactions on Wireless Communications (2009) Saad-ITransW-2009" A Distributed Coalition Formation Framework for Fair User Cooperation in Wireless Networks , 2022 .
[386] E. Altman,et al. An evolutionary game perspective to ALOHA with power control , 2005 .
[387] M. Silaghi,et al. Using Secure DisCSP Solvers for Generalized Vickrey Auctions ∗ Complete and Stochastic Secure Techniques , 2005 .
[388] S. Barbarossa,et al. Asynchronous Iterative Waterfilling for Gaussian Frequency-Selective Interference Channels: A Unified Framework , 2007, 2007 Information Theory and Applications Workshop.
[389] Sven Leyffer,et al. Solving multi-leader–common-follower games , 2010, Optim. Methods Softw..
[390] Katia P. Sycara,et al. No-commitment branch and bound search for distributed constraint optimization , 2006, AAMAS '06.
[391] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[392] Liuba Shrira,et al. HQ replication: a hybrid quorum protocol for byzantine fault tolerance , 2006, OSDI '06.
[393] Levente Buttyán,et al. Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.
[394] Ephraim Zehavi,et al. Bargaining over the interference channel with total power constraints , 2009, 2009 International Conference on Game Theory for Networks.
[395] Michael Dahlin,et al. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults , 2009, NSDI.
[396] Jean-Pierre Hubaux,et al. Game Theory in Wireless Networks: A Tutorial , 2006 .
[397] Jens Zander,et al. Jamming games in slotted Aloha packet radio networks , 1990, IEEE Conference on Military Communications.
[398] Frank Kelly,et al. Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..
[399] Peter Marbach,et al. Bandwidth allocation in ad hoc networks: a price-based approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[400] Michael P. Wellman,et al. Computing approximate bayes-nash equilibria in tree-games of incomplete information , 2004, EC '04.
[401] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[402] G. Croes. A Method for Solving Traveling-Salesman Problems , 1958 .
[403] B. Peleg,et al. Strategy-proof voting schemes with continuous preferences , 1990 .
[404] Tiina Heikkinen,et al. On Congestion Pricing in a Wireless Network , 2002, Wirel. Networks.
[405] Makoto Yokoo,et al. Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..
[406] Keith S. Decker,et al. A complete distributed constraint optimization method for non-traditional pseudotree arrangements , 2007, AAMAS '07.
[407] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[408] Stephen B. Wicker,et al. A Duopoly Pricing Game for Wireless IP Services , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[409] Christian Cachin,et al. Secure INtrusion-Tolerant Replication on the Internet , 2002, Proceedings International Conference on Dependable Systems and Networks.
[410] C. Barral,et al. A Protection Scheme for MOC-Enabled Smart Cards , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[411] Vincent W. S. Wong,et al. Utility-optimal random access without message passing , 2009, IEEE Transactions on Wireless Communications.
[412] Michael L. Honig,et al. Sequential Bandwidth and Power Auctions for Distributed Spectrum Sharing , 2008, IEEE Journal on Selected Areas in Communications.
[413] Christian Bessiere,et al. DisChoco 2: A Platform for Distributed Constraint Reasoning , 2011 .
[414] Zhu Han,et al. Improved Wireless Secrecy Rate Using Distributed Auction Theory , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[415] Byeong Gi Lee,et al. Distributed Resource Allocation through Noncooperative Game Approach in Multi-cell OFDMA Systems , 2006, 2006 IEEE International Conference on Communications.
[416] H. Vincent Poor,et al. Energy-Efficient Resource Allocation in Wireless Networks , 2007, IEEE Signal Processing Magazine.
[417] Guy Pujolle,et al. Introduction to queueing networks , 1987 .
[418] Sergio Barbarossa,et al. Competitive Design of Multiuser MIMO Systems Based on Game Theory: A Unified View , 2008, IEEE Journal on Selected Areas in Communications.
[419] Narayan B. Mandayam,et al. Coalitional Games in Gaussian Interference Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[420] John M. Cioffi,et al. Rate and power control in a two-user multicarrier channel with no coordination: the optimal scheme versus a suboptimal method , 2003, IEEE Trans. Commun..
[421] Boi Faltings,et al. ODPOP: An Algorithm for Open/Distributed Constraint Optimization , 2006, AAAI.
[422] Marko Vukolic,et al. The next 700 BFT protocols , 2010, EuroSys '10.
[423] Christian Bessiere,et al. Distributed Dynamic Backtracking , 2001, CP.
[424] Adam Duffy,et al. A Biometric Identity Based Signature Scheme , 2007, Int. J. Netw. Secur..
[425] Bo Li,et al. Non-cooperative power control for wireless ad hoc networks with repeated games , 2007, IEEE Journal on Selected Areas in Communications.
[426] Michael L. Honig,et al. Utility-based power control for a two-cell CDMA data network , 2005, IEEE Transactions on Wireless Communications.
[427] Makoto Yokoo,et al. Dynamic DFS Tree in ADOPT-ing , 2007, AAAI.
[428] Michael L. Honig,et al. Forward-link resource allocation for a two-cell voice network with multiple service classes , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[429] Eugene C. Freuder,et al. Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving , 2005, Artif. Intell..
[430] Ness B. Shroff,et al. Downlink power allocation for multi-class CDMA wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[431] Eytan Modiano,et al. Wireless channel allocation using an auction algorithm , 2006, IEEE Journal on Selected Areas in Communications.
[432] A. Lee Swindlehurst,et al. Bargaining and the MISO Interference Channel , 2009, EURASIP J. Adv. Signal Process..
[433] T. Charles Clancy,et al. A multi-winner cognitive spectrum auction framework with collusion-resistant mechanisms , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[434] Zhu Han,et al. A selfish approach to coalition formation among unmanned air vehicles in wireless networks , 2009, 2009 International Conference on Game Theory for Networks.
[435] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[436] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[437] Robbert van Renesse,et al. Toward a cloud computing research agenda , 2009, SIGA.
[438] Arun Ross,et al. Toward reconstructing fingerprints from minutiae points , 2005, SPIE Defense + Commercial Sensing.
[439] L. Shapley,et al. Potential Games , 1994 .
[440] Sven Koenig,et al. BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm , 2008, AAMAS.