A High-Throughput Byzantine Fault-Tolerant Protocol

State-machine replication (SMR) is a software technique for tolerating failures and for providing high availability in large-scale systems, through the use of commodity hardware. A replicated state-machine comprises a number of replicas, each of which runs an agreement protocol, with the goal of ensuring a consistent state across all of the replicas. In hostile environments, such as the Internet, Byzantine fault tolerant state-machine replication (BFT) is an important technique for providing robust services. During the past decade, we have seen an emergence of various BFT protocols. In order to be adopted, besides providing correctness, a BFT must provide good performance as well. Consequently, all of the new protocols focus on improving performance under various conditions. However, a closer look at the performance of state-of-the-art BFT protocols reveals that even in best-case execution scenarios, they still remain far behind their theoretical maximum. Based on exhaustive evaluation and monitoring of existing BFT protocols, we highlight a few impediments to their scalability. These obstructions include the use of IP multicast, the presence of bottlenecks due to asymmetric replica processing, and an unbalanced network bandwidth utilization. The goal of this thesis is to evaluate the actual impact of these scalability impediments, and to offer a solution for a high-throughput BFT protocol in the case in which the network itself is the bottleneck. To that end, we have developed Ring, a new BFT protocol which circumvents the aforementioned impediments. As its name suggests, Ring uses the ring communication topology, in the fault-free case. In the ring topology, each replica only performs point-to-point communications with two other replicas, namely its neighbors on the ring. Moreover, all of the replicas equally accept requests from clients and perform symmetric processing. Our performance evaluation shows that, with the network as the bottleneck, Ring outperforms all other, state-of-the-art BFT protocols. Ring achieves 118 Mbps on the Fast Ethernet – a 24% improvement in throughput over previous protocols. Finally, we conducted an extensive practical and analytic evaluation of Ring. In order to analyse benefits (and drawbacks) of Ring (and other protocols) under different settings, without resorting to costly experimentation, we developed an analytical performance model. Our performance model is based on queueing theory, and relies only on a handful of protocolagnostic measurements of the environment.

[1]  Kenneth W. Shum,et al.  Convergence of Iterative Waterfilling Algorithm for Gaussian Interference Channels , 2007, IEEE Journal on Selected Areas in Communications.

[2]  Stephen S. Lavenberg,et al.  Mean-Value Analysis of Closed Multichain Queuing Networks , 1980, JACM.

[3]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[4]  Nicholas R. Jennings,et al.  Decentralised coordination of low-power embedded devices using the max-sum algorithm , 2008, AAMAS.

[5]  Edmund M. Yeh,et al.  Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay Networks , 2007, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[6]  Quanyan Zhu,et al.  A constrained evolutionary Gaussian multiple access channel game , 2009, 2009 International Conference on Game Theory for Networks.

[7]  J. Nash THE BARGAINING PROBLEM , 1950, Classics in Game Theory.

[8]  Rajarathnam Chandramouli,et al.  Price dynamics in competitive agile spectrum access markets , 2007, IEEE Journal on Selected Areas in Communications.

[9]  Koushik Kar,et al.  Bandwidth allocation games under budget and access constraints , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[10]  Stephen B. Wicker,et al.  Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Vasilios A. Siris,et al.  Resource control for elastic traffic in CDMA networks , 2002, MobiCom '02.

[12]  Vincent Fleury,et al.  About the equilibrium shape of fibred structures, and biological shapes. , 2004, Comptes rendus biologies.

[13]  Y. S. Moon,et al.  Wavelet based fingerprint liveness detection , 2005 .

[14]  Dan Dobre,et al.  Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[15]  Milind Tambe,et al.  Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.

[16]  George D. Stamoulis,et al.  Auction-Based Resource Reservation in 2.5/3G Networks , 2004, Mob. Networks Appl..

[17]  N. Mandayam,et al.  Demand responsive pricing and competitive spectrum allocation via a spectrum server , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[18]  Wei Yu,et al.  Iterative water-filling for Gaussian vector multiple-access channels , 2001, IEEE Transactions on Information Theory.

[19]  P. Olver Nonlinear Systems , 2013 .

[20]  Meritxell Vinyals,et al.  A Survey on Sensor Networks from a Multiagent Perspective , 2011, Comput. J..

[21]  R. Srikant,et al.  The marginal user principle for resource allocation in wireless networks , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[22]  Zhu Han,et al.  Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks: A Game-Theoretic Modeling Approach , 2009, IEEE Transactions on Mobile Computing.

[23]  Nancy A. Lynch,et al.  Consensus in the presence of partial synchrony , 1988, JACM.

[24]  John Lane,et al.  Byzantine replication under attack , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[25]  Pierfrancesco La Mura Game Networks , 2000, UAI.

[26]  Marko Vukolic,et al.  Abstractions for asynchronous distributed computing with malicious players , 2008 .

[27]  Ramakrishna Kotla,et al.  Zyzzyva: speculative byzantine fault tolerance , 2007, TOCS.

[28]  Paolo Santi,et al.  COMMIT: a sender-centric truthful and energy-efficient routing protocol for ad hoc networks with selfish nodes , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[29]  K. J. Ray Liu,et al.  Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation , 2008, IEEE Journal on Selected Areas in Communications.

[30]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[31]  Boi Faltings,et al.  Ensuring Privacy through Distributed Computation in Multiple-Depot Vehicle Routing Problems , 2010 .

[32]  Amnon Meisels,et al.  Asymmetric Distributed Constraint Optimization , 2009 .

[33]  Francisco Facchinei,et al.  Distributed Power Allocation With Rate Constraints in Gaussian Parallel Interference Channels , 2007, IEEE Transactions on Information Theory.

[34]  Bart De Decker,et al.  On Securely Scheduling a Meeting , 2001, SEC.

[35]  Marius-Calin Silaghi Hiding Absence of Solution for a Distributed Constraint Satisfaction Problem , 2005, FLAIRS Conference.

[36]  Mike Hibler,et al.  An integrated experimental environment for distributed systems and networks , 2002, OPSR.

[37]  Boi Faltings,et al.  ABT with Asynchronous Reordering , 2001 .

[38]  Jaideep Vaidya,et al.  Privacy-preserving linear programming , 2009, SAC '09.

[39]  Ching-Yao Huang,et al.  Non-cooperative uplink power control in cellular radio systems , 1998, Wirel. Networks.

[40]  John M. Cioffi,et al.  Uniform power allocation in MIMO channels: a game-theoretic approach , 2003, IEEE Transactions on Information Theory.

[41]  Holger Boche,et al.  Nash bargaining and proportional fairness for log-convex utility sets , 2008, ICASSP 2008.

[42]  K. J. Ray Liu,et al.  Belief-Assisted Pricing for Dynamic Spectrum Allocation in Wireless Networks with Selfish Users , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[43]  To-Yat Cheung,et al.  Graph Traversal Techniques and the Maximum Flow Problem in Distributed Computation , 1983, IEEE Transactions on Software Engineering.

[44]  Amnon Meisels,et al.  Asynchronous Forward-checking for DisCSPs , 2007, Constraints.

[45]  Adrian Petcu FRODO: A FRamework for Open/Distributed constraint Optimization , 2006 .

[46]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .

[47]  Anthony Ephremides,et al.  A game-theoretic look at simple relay channel , 2006, Wirel. Networks.

[48]  Michael Still The Definitive Guide to ImageMagick , 2005 .

[49]  I. Glicksberg A FURTHER GENERALIZATION OF THE KAKUTANI FIXED POINT THEOREM, WITH APPLICATION TO NASH EQUILIBRIUM POINTS , 1952 .

[50]  Boi Faltings,et al.  Coordinating Logistics Operations with Privacy Guarantees , 2011, IJCAI.

[51]  Christian Cachin,et al.  Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.

[52]  Jean-Daniel Boissonnat,et al.  Incremental construction of the delaunay triangulation and the delaunay graph in medium dimension , 2009, SCG '09.

[53]  Johan Hultell,et al.  Cooperative and non-cooperative wireless access : Resource and infrastructure sharing regimes , 2008 .

[54]  Michael L. Honig,et al.  Two-cell utility-based resource allocation for a CDMA voice service , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[55]  Sergio Barbarossa,et al.  IEEE TRANSACTIONS ON SIGNAL PROCESSING (ACCEPTED) 1 The MIMO Iterative Waterfilling Algorithm , 2022 .

[56]  Krzysztof Kuchcinski,et al.  JaCoP - Java Constraint Programming Solver , 2013, CP 2013.

[57]  George Kesidis,et al.  Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.

[58]  Boi Faltings,et al.  Privacy-Preserving Multi-agent Constraint Satisfaction , 2009, 2009 International Conference on Computational Science and Engineering.

[59]  Milind Tambe,et al.  Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.

[60]  Sergio Barbarossa,et al.  Potential Games: A Framework for Vector Power Control Problems With Coupled Constraints , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[61]  John Rompel,et al.  One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.

[62]  Makoto Yokoo,et al.  Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..

[63]  Leonardo Badia,et al.  Radio Resource Management with Utility and Pricing for Wireless LAN Hot-Spots , 2005, Wirel. Pers. Commun..

[64]  Milind Tambe,et al.  Distributed Algorithms for DCOP: A Graphical-Game-Based Approach , 2004, PDCS.

[65]  Ephraim Zehavi,et al.  Game theory and the frequency selective interference channel - A tutorial , 2009, ArXiv.

[66]  Peter Marbach,et al.  Cooperation in wireless ad hoc networks: a market-based approach , 2005, IEEE/ACM Transactions on Networking.

[67]  M. Schulz,et al.  Ninhydrin-dyed latent fingerprints as a DNA source in a murder case. , 2004, Journal of clinical forensic medicine.

[68]  Cristina Comaniciu,et al.  A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha , 2008, IEEE Transactions on Wireless Communications.

[69]  Miguel Correia,et al.  Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[70]  Patrick Maillé,et al.  Analysis of Price Competition in a Slotted Resource Allocation Game , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[71]  Wenliang Du,et al.  Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[72]  Martin Drahanský Experiments with Skin Resistance and Temperature for Liveness Detection , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[73]  Weixiong Zhang,et al.  Distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks , 2005, Artif. Intell..

[74]  Nico M. van Dijk Queueing networks and product forms - a systems approach , 1993, Wiley-Interscience series in systems and optimization.

[75]  Zhu Han,et al.  Physical layer security: Coalitional games for distributed cooperation , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[76]  Amnon Meisels,et al.  Measuring Distributed Constraint Optimization algorithms , 2008 .

[77]  Jean-Pierre Hubaux,et al.  Wireless Operators in a Shared Spectrum , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[78]  Amir Leshem,et al.  Iterative power pricing for distributed spectrum coordination in DSL , 2009, IEEE Transactions on Communications.

[79]  T. Basar,et al.  Differentiated Internet pricing using a hierarchical network game model , 2004, Proceedings of the 2004 American Control Conference.

[80]  Amnon Meisels,et al.  Distributed Search by Constrained Agents: Algorithms, Performance, Communication , 2007, Advanced Information and Knowledge Processing.

[81]  Amnon Meisels,et al.  Concurrent search for distributed CSPs , 2006, Artif. Intell..

[82]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[83]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[84]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[85]  Johan Hultell,et al.  Decentralized Market-Based Radio Resource Management in Multi-Network Environments , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[86]  B. Grosz,et al.  SSDPOP : Using Secret Sharing to Improve the Privacy of DCOP , 2007 .

[87]  Guan-Ming Su,et al.  Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks , 2009, EURASIP J. Adv. Signal Process..

[88]  Pedro Meseguer,et al.  Distributed Forward Checking May Lie for Privacy , 2006, CSCLP.

[89]  Milind Tambe,et al.  Quality guarantees for region optimal DCOP algorithms , 2011, AAMAS.

[90]  G. I. Kustova,et al.  From the author , 2019, Automatic Documentation and Mathematical Linguistics.

[91]  Klara Nahrstedt,et al.  iPass: an incentive compatible auction scheme to enable packet forwarding service in MANET , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[92]  G. Clarke,et al.  Scheduling of Vehicles from a Central Depot to a Number of Delivery Points , 1964 .

[93]  Y. Fukui,et al.  Biometric Identity Verification Using Intra-Body Propagation Signal , 2007, 2007 Biometrics Symposium.

[94]  N. Mandayam,et al.  Coalitional Games in Receiver Cooperation for Spectrum Sharing , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[95]  Narayan B. Mandayam,et al.  Coalitions in Cooperative Wireless Networks , 2008, IEEE Journal on Selected Areas in Communications.

[96]  G. de Jager,et al.  A survey of point pattern matching techniques and a new approach to point pattern recognition , 1992, Proceedings of the 1992 South African Symposium on Communications and Signal Processing.

[97]  Ness B. Shroff,et al.  Utility-based power control in cellular wireless systems , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[98]  Patrick Maillé,et al.  Price War with Partial Spectrum Sharing for Competitive Wireless Service Providers , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[99]  Dusit Niyato,et al.  A game theoretic analysis of service competition and pricing in heterogeneous wireless access networks , 2008, IEEE Transactions on Wireless Communications.

[100]  Tadeusz Czachórski,et al.  Performance evaluation of fork and join synchronization primitives , 1987, Acta Informatica.

[101]  EDDIE KOHLER,et al.  The click modular router , 2000, TOCS.

[102]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[103]  Bir Bhanu,et al.  Fingerprint Indexing Based on Novel Features of Minutiae Triplets , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[104]  Wei Li,et al.  Privacy-preserving horizontally partitioned linear programs with inequality constraints , 2013, Optim. Lett..

[105]  Sylvain Piechowiak,et al.  A complete algorithm for DisCSP : Distributed Backtracking with Sessions ( DBS ) , 2009 .

[106]  Marius-Calin Silaghi,et al.  Asynchronous Search with Aggregations , 2000, AAAI/IAAI.

[107]  Serge Vaudenay,et al.  Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.

[108]  Nancy A. Lynch,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[109]  Qian Zhang,et al.  Competitions and dynamics of duopoly wireless service providers in dynamic spectrum market , 2008, MobiHoc '08.

[110]  Jean-Yves Le Boudec Performance Evaluation of Computer and Communication Systems , 2010, Computer and communication sciences.

[111]  Radoslaw Szymanek,et al.  FRODO 2.0: An Open-Source Framework for Distributed Constraint Optimization , 2009, IJCAI 2009.

[112]  Stephen B. Wicker,et al.  Selfish users in Aloha: a game-theoretic approach , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[113]  Andrew A. Marino,et al.  Laplace Plane Analysis of Skin Impedance: A Preliminary Investigation , 1978 .

[114]  Bengt Holmstrom,et al.  GROVES' SCHEME ON RESTRICTED DOMAINS , 1979 .

[115]  Victor Lesser,et al.  A Mediation Based Protocol for Distributed Constraint Satisfaction , 2003 .

[116]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[117]  Kin K. Leung,et al.  Multi-objective power control and signature sequence adaptation for synchronous cdma systems - a game-theoretic viewpoint , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[118]  Jerry R. Green,et al.  Characterization of Satisfactory Mechanisms for the Revelation of Preferences for Public Goods , 1977 .

[119]  Eitan Altman,et al.  A survey on networking games in telecommunications , 2006, Comput. Oper. Res..

[120]  Daphne Koller,et al.  Multi-agent algorithms for solving graphical games , 2002, AAAI/IAAI.

[121]  Richard J. La,et al.  Auction mechanism for spectrum allocation and profit sharing , 2009, 2009 International Conference on Game Theory for Networks.

[122]  Makoto Yokoo,et al.  When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty , 2010, AAMAS.

[123]  Wei Yu,et al.  Distributed multiuser power control for digital subscriber lines , 2002, IEEE J. Sel. Areas Commun..

[124]  Cem U. Saraydar,et al.  Power control in a multicell CDMA data system using pricing , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).

[125]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[126]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[127]  Klara Nahrstedt,et al.  Price-based resource allocation in wireless ad hoc networks , 2003, IWQoS'03.

[128]  Mihaela van der Schaar,et al.  Learning for Dynamic Bidding in Cognitive Radio Resources , 2007, ArXiv.

[129]  Luis Ceze,et al.  Deterministic Process Groups in dOS , 2010, OSDI.

[130]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[131]  Silvia Giordano,et al.  Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .

[132]  Erik G. Larsson,et al.  Competition Versus Cooperation on the MISO Interference Channel , 2008, IEEE Journal on Selected Areas in Communications.

[133]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.

[134]  Rachid El Azouzi,et al.  Slotted Aloha as a Stochastic Game with Partial Information , 2003 .

[135]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[136]  Boi Faltings,et al.  Secure Combinatorial Optimization Simulating DFS Tree-Based Variable Elimination , 2006, AI&M.

[137]  David J. Goodman,et al.  Power control for wireless data , 2000, IEEE Wirel. Commun..

[138]  Sen Hu,et al.  Efficient system-enforced deterministic parallelism , 2010, OSDI.

[139]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[140]  李幼升,et al.  Ph , 1989 .

[141]  Sajal K. Das,et al.  ARC: an integrated admission and rate control framework for competitive wireless CDMA data networks using noncooperative games , 2005, IEEE Transactions on Mobile Computing.

[142]  Stephen B. Wicker,et al.  Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..

[143]  M. Roggendorf Dynamic pricing of wireless network resources in a competitive provider setting , 2008 .

[144]  Julie Thorpe,et al.  Pass-thoughts: authenticating with our minds , 2005, NSPW '05.

[145]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[146]  Jon Crowcroft,et al.  Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.

[147]  V. Georgiev Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .

[148]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[149]  Yiannis Tsiounis,et al.  On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.

[150]  Nilo Casimiro Ericsson,et al.  Revenue Maximization in Resource Allocation : Applications in Wireless Communication Networks , 2004 .

[151]  Jean-Pierre Hubaux,et al.  Border Games in Cellular Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[152]  Kin Kwong Leung,et al.  Distributed sequence adaptation for capacity maximization of DS-CDMA systems , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[153]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[154]  Boi Faltings,et al.  Asynchronous Forward Bounding (AFB): Implementation and Performance Experiments , 2011 .

[155]  A. Leshem,et al.  Distributed coordination of spectrum and the prisoner~s dilemma , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[156]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[157]  Gustavo de Veciana,et al.  Cooperation and decision-making in a wireless multi-provider setting , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[158]  David Tse,et al.  Spectrum Sharing Between Wireless Networks , 2008, IEEE/ACM Transactions on Networking.

[159]  Jean C. Walrand,et al.  Base Station Association Game in Multi-Cell Wireless Networks (Special Paper) , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[160]  Amnon Meisels,et al.  Concurrent Dynamic Backtracking for Distributed CSPs , 2004, CP.

[161]  Flavio Paiva Junqueira,et al.  Scalable Agreement: Toward Ordering as a Service , 2010, HotDep.

[162]  Scott Shenker,et al.  General Characterization Parameters for Integrated Service Network Elements , 1997, RFC.

[163]  Minghua Chen,et al.  Optimal resource allocation for OFDM uplink communication: A primal-dual approach , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[164]  Chuck Lever,et al.  Scalable Network I/O in Linux , 2000, USENIX Annual Technical Conference, FREENIX Track.

[165]  Marius-Calin Silaghi,et al.  Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[166]  Gunter Bolch,et al.  Queueing Networks and Markov Chains , 2005 .

[167]  Zhu Han,et al.  A Distributed Merge and Split Algorithm for Fair Cooperation in Wireless Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[168]  L. Dasilva,et al.  Node Participation in Ad Hoc and Peer-to-Peer Networks: A Game-Theoretic Formulation , 2004 .

[169]  Christian Bessiere,et al.  Asynchronous Inter-Level Forward-Checking for DisCSPs , 2009, CP.

[170]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[171]  Roie Zivan,et al.  Distributed Constraint Optimization for Large Teams of Mobile Sensing Agents , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[172]  Narayan B. Mandayam,et al.  Pricing and power control for joint network-centric and user-centric radio resource management , 2004, IEEE Transactions on Communications.

[173]  Holger Boche,et al.  Non-symmetric Nash bargaining solution for resource allocation in wireless networks and connection to interference calculus , 2007, 2007 15th European Signal Processing Conference.

[174]  Leslie Lamport,et al.  Time, clocks, and the ordering of events in a distributed system , 1978, CACM.

[175]  David C. Parkes,et al.  Iterative combinatorial auctions: achieving economic and computational efficiency , 2001 .

[176]  Makoto Yokoo,et al.  Asynchronous Weak-commitment Search for Solving Distributed Constraint Satisfaction Problems , 1995, CP.

[177]  S. Wittevrongel,et al.  Queueing Systems , 2019, Introduction to Stochastic Processes and Simulation.

[178]  Milind Tambe,et al.  Asynchronous algorithms for approximate distributed constraint optimization with quality bounds , 2010, AAMAS.

[179]  Michael L. Honig,et al.  Forward-link CDMA resource allocation based on pricing , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[180]  Pedro Meseguer,et al.  Distributed Forward Checking , 2003, CP.

[181]  Yong Huat Chew,et al.  Decentralized bit, subcarrier and power allocation with interference avoidance in multicell OFDMA systems using game theoretic approach , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[182]  James R. Jackson,et al.  Jobshop-Like Queueing Systems , 2004, Manag. Sci..

[183]  Zhi-Quan Luo,et al.  Analysis of Iterative Waterfilling Algorithm for Multiuser Power Control in Digital Subscriber Lines , 2006, EURASIP J. Adv. Signal Process..

[184]  Amnon Meisels,et al.  Completeness and Performance Of The APO Algorithm , 2008, J. Artif. Intell. Res..

[185]  Boi Faltings,et al.  M-DPOP: Faithful Distributed Implementations of Efficient Social Choice Problems , 2008 .

[186]  Boi Faltings,et al.  A-DPOP: Approximations in Distributed Optimization , 2005 .

[187]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[188]  Bin Chen,et al.  Cognitive Radio Channel Allocation Using Auction Mechanisms , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[189]  Zhu Han,et al.  Fair multiuser channel allocation for OFDMA networks using Nash bargaining solutions and coalitions , 2005, IEEE Transactions on Communications.

[190]  Carmel Domshlak,et al.  Sensor networks and distributed CSP: communication, computation and complexity , 2005, Artif. Intell..

[191]  Amnon Meisels,et al.  Concurrent Forward Bounding for DCOPs , 2010 .

[192]  Refik Molva,et al.  Analysis of coalition formation and cooperation strategies in mobile ad hoc networks , 2005, Ad Hoc Networks.

[193]  Serge Vaudenay A classical introduction to cryptography - applications for communications security , 2005 .

[194]  Yoav Shoham,et al.  Towards a universal test suite for combinatorial auction algorithms , 2000, EC '00.

[195]  Robert P. Gilles,et al.  On the Role of Game Theory in the Analysis of Software Radio Networks , 2002 .

[196]  Stephanie Schuckers,et al.  Time-series detection of perspiration as a liveness test in fingerprint devices , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[197]  Jianwei Huang,et al.  Competition of wireless providers for atomic users: Equilibrium and social optimality , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[198]  Amnon Meisels,et al.  Asynchronous Forward-Bounding for Distributed Constraints Optimization , 2006, ECAI.

[199]  A. Lee Swindlehurst,et al.  Cooperative Power Scheduling for Wireless MIMO Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[200]  Cem U. Saraydar,et al.  Efficient power control via pricing in wireless data networks , 2002, IEEE Trans. Commun..

[201]  Makoto Yokoo,et al.  Nogood based asynchronous distributed optimization (ADOPT ng) , 2006, AAMAS '06.

[202]  Xiang-Yang Li,et al.  Truthful multicast routing in selfish wireless networks , 2004, MobiCom '04.

[203]  Yann Chevaleyre,et al.  Issues in Multiagent Resource Allocation , 2006, Informatica.

[204]  Zhu Han,et al.  Power minimization for multi-cell OFDM networks using distributed non-cooperative game approach , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[205]  Shamik Sengupta,et al.  Dynamic pricing for service provisioning and network selection in heterogeneous networks , 2009, Phys. Commun..

[206]  Makoto Yokoo,et al.  Distributed Private Constraint Optimization , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[207]  Marc Moonen,et al.  Autonomous Spectrum Balancing for Digital Subscriber Lines , 2007, IEEE Transactions on Signal Processing.

[208]  Mihaela van der Schaar,et al.  Bargaining Strategies for Networked Multimedia Resource Management , 2007, IEEE Transactions on Signal Processing.

[209]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[210]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[211]  Makoto Yokoo,et al.  Distributed constraint satisfaction for formalizing distributed problem solving , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.

[212]  Kaveh Pahlavan,et al.  Wireless Multimedia Network Technologies , 2013 .

[213]  Keith S. Decker,et al.  Coordination for uncertain outcomes using distributed neighbor exchange , 2010, AAMAS.

[214]  Michael K. Reiter,et al.  Fault-scalable Byzantine fault-tolerant services , 2005, SOSP '05.

[215]  K. Mani Chandy,et al.  Open, Closed, and Mixed Networks of Queues with Different Classes of Customers , 1975, JACM.

[216]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[217]  Philippe Oechslin,et al.  Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.

[218]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[219]  Russell Bent,et al.  The Value of Consensus in Online Stochastic Scheduling , 2004, ICAPS.

[220]  Hesham El Gamal,et al.  The Water-Filling Game in Fading Multiple-Access Channels , 2005, IEEE Transactions on Information Theory.

[221]  R. Aumann Subjectivity and Correlation in Randomized Strategies , 1974 .

[222]  Milind Tambe,et al.  Taking DCOP to the real world: efficient complete solutions for distributed multi-event scheduling , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[223]  Eddie Kohler,et al.  The Click modular router , 1999, SOSP.

[224]  Michel Gendreau,et al.  Metaheuristics for the Vehicle Routing Problem and Its Extensions: A Categorized Bibliography , 2008 .

[225]  Cem U. Saraydar,et al.  Pricing and power control in a multicell wireless data network , 2001, IEEE J. Sel. Areas Commun..

[226]  Rachid Guerraoui,et al.  Throughput optimal total order broadcast for cluster environments , 2010, TOCS.

[227]  Jie Gao,et al.  Game Theoretic Solutions for Precoding Strategies over the Interference Channel , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[228]  Marie Sandström Liveness Detection in Fingerprint Recognition Systems , 2004 .

[229]  A. Kumar,et al.  A New Method for Fingerprint Antispoofing using Pulse Oxiometry , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[230]  J. Walrand,et al.  WiFi access point pricing as a dynamic game , 2006, IEEE/ACM Transactions on Networking.

[231]  Boi Faltings,et al.  Privacy Guarantees through Distributed Constraint Satisfaction , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[232]  Boi Faltings,et al.  E[DPOP]: Distributed Constraint Optimization under Stochastic Uncertainty using Collaborative Sampling , 2009, IJCAI 2009.

[233]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .

[234]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[235]  Robert N. Lass,et al.  DCOPolis : A Framework for Simulating and Deploying Distributed Constraint Optimization Algorithms , 2007 .

[236]  Milind Tambe,et al.  Quality Guarantees on k-Optimal Solutions for Distributed Constraint Optimization Problems , 2007, IJCAI.

[237]  Alessandra Lumini,et al.  Can Fingerprints be Reconstructed from ISO Templates? , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[238]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[239]  Sangmin Lee,et al.  Upright cluster services , 2009, SOSP '09.

[240]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[241]  K.J.R. Liu,et al.  Game theoretical mechanism design methods , 2008, IEEE Signal Processing Magazine.

[242]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[243]  Qiang Tang,et al.  An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.

[244]  M. F.,et al.  Bibliography , 1985, Experimental Gerontology.

[245]  Jaihie Kim,et al.  Aliveness Detection of Fingerprints using Multiple Static Features , 2007 .

[246]  Zhu Han,et al.  Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks , 2009, IEEE INFOCOM 2009.

[247]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[248]  Victor R. Lesser,et al.  Solving distributed constraint optimization problems using cooperative mediation , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[249]  Leslie Lamport,et al.  Lower bounds for asynchronous consensus , 2006, Distributed Computing.

[250]  Boi Faltings,et al.  Distributed Constraint Optimization Under Stochastic Uncertainty , 2011, AAAI.

[251]  K. J. Ray Liu,et al.  An auction-based framework for multimedia streaming over cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[252]  Sennur Ulukus,et al.  Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.

[253]  K. J. Ray Liu,et al.  A scalable collusion-resistant multi-winner cognitive spectrum auction game , 2009, IEEE Transactions on Communications.

[254]  Mérouane Debbah,et al.  Power allocation games for mimo multiple access channels with coordination , 2009, IEEE Transactions on Wireless Communications.

[255]  Jacques Stern,et al.  A new public key cryptosystem based on higher residues , 1998, CCS '98.

[256]  Rida A. Bazzi,et al.  Matrix Signatures: From MACs to Digital Signatures in Distributed Systems , 2008, DISC.

[257]  George Bebis,et al.  Fingerprint identification using Delaunay triangulation , 1999, Proceedings 1999 International Conference on Information Intelligence and Systems (Cat. No.PR00446).

[258]  Haitao Zheng,et al.  A General Framework for Wireless Spectrum Auctions , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[259]  Yoav Tock,et al.  Dr. multicast: Rx for data center communication scalability , 2010, EuroSys '10.

[260]  Jeffrey C. Mogul,et al.  Scalable Kernel Performance for Internet Servers Under Realistic Loads , 1998, USENIX Annual Technical Conference.

[261]  Allen B. MacKenzie,et al.  A game theory perspective on interference avoidance , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[262]  M. Drahansky,et al.  Liveness Detection based on Fine Movements of the Fingertip Surface , 2006, 2006 IEEE Information Assurance Workshop.

[263]  Zhu Han,et al.  Auction-Based Resource Allocation for Cooperative Communications , 2008, IEEE Journal on Selected Areas in Communications.

[264]  Chao Liang,et al.  Power Management in MIMO Ad Hoc Networks: A Game-Theoretic Approach , 2007, IEEE Transactions on Wireless Communications.

[265]  Eitan Altman,et al.  Asymmetric delay in evolutionary games , 2007, VALUETOOLS.

[266]  Michael P. Wellman,et al.  Constraint satisfaction algorithms for graphical games , 2007, AAMAS '07.

[267]  N. Bonneau,et al.  Non-Atomic Games for Multi-User Systems , 2007, IEEE J. Sel. Areas Commun..

[268]  Ibrahim Sogukpinar,et al.  Fingerprint Hardening with Randomly Selected Chaff Minutiae , 2007, CAIP.

[269]  Michael L. Honig,et al.  Distributed interference compensation for wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[270]  Niki Pissinou,et al.  Resource allocation based on pricing for wireless multimedia networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[271]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[272]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[273]  G S Sodhi,et al.  Fingermarks detection by eosin-blue dye. , 2001, Forensic science international.

[274]  Atul Singh,et al.  BFT Protocols Under Fire , 2008, NSDI.

[275]  Wei-Min Shen,et al.  A Dynamic Distributed Constraint Satisfaction Approach to Resource Allocation , 2001, CP.

[276]  Andrea J. Goldsmith,et al.  Competition in Wireless Systems via Bayesian Interference Games , 2007, ArXiv.

[277]  Christian Bessiere,et al.  Asynchronous backtracking without adding links: a new member in the ABT family , 2005, Artif. Intell..

[278]  Boi Faltings,et al.  Coordinating Agent Plans Through Distributed Constraint Optimization , 2008 .

[279]  Michael L. Honig,et al.  Single-cell forward link power allocation using pricing in wireless networks , 2004, IEEE Transactions on Wireless Communications.

[280]  John C. S. Lui,et al.  A game-theoretic analysis of the implications of overlay network traffic on ISP peering , 2008, Comput. Networks.

[281]  Boi Faltings,et al.  A Scalable Method for Multiagent Constraint Optimization , 2005, IJCAI.

[282]  Boi Faltings,et al.  S-DPOP: Superstabilizing, Fault-containing Multiagent Combinatorial Optimization , 2005, AAAI 2005.

[283]  Dejan Kostic,et al.  Towards a cost-effective networking testbed , 2010, OPSR.

[284]  Roy D. Yates,et al.  Service provider competition and pricing for dynamic spectrum allocation , 2009, 2009 International Conference on Game Theory for Networks.

[285]  Dusit Niyato,et al.  Modeling User Churning Behavior in Wireless Networks Using Evolutionary Game Theory , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[286]  Alan L. Cox,et al.  Optimizing network virtualization in Xen , 2006 .

[287]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[288]  Billy E. Gillett,et al.  A Heuristic Algorithm for the Vehicle-Dispatch Problem , 1974, Oper. Res..

[289]  Francesca Rossi,et al.  Multi‐Agent Constraint Systems with Preferences: Efficiency, Solution Quality, and Privacy Loss , 2004, Comput. Intell..

[290]  Nicholas R. Jennings,et al.  U-GDL: A decentralised algorithm for DCOPs with Uncertainty , 2011 .

[291]  Paramvir Bahl,et al.  White space networking with wi-fi like connectivity , 2009, SIGCOMM '09.

[292]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[293]  P. Marbach,et al.  Wireless Social Community Networks: A Game-Theoretic Analysis , 2008, 2008 IEEE International Zurich Seminar on Communications.

[294]  Jens Zander,et al.  Jamming in slotted ALOHA multihop packet radio networks , 1991, IEEE Trans. Commun..

[295]  Fernando Pedone,et al.  Ring Paxos: A high-throughput atomic broadcast protocol , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[296]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[297]  Zhu Han,et al.  A Game-Based Self-Organizing Uplink Tree for VoIP Services in IEEE 802.16j Networks , 2009, 2009 IEEE International Conference on Communications.

[298]  Mung Chiang,et al.  Balancing supply and demand of bandwidth in wireless cellular networks: utility maximization over powers and rates , 2004, IEEE INFOCOM 2004.

[299]  Erik G. Larsson,et al.  The MISO interference channel from a game-theoretic perspective: A combination of selfishness and altruism achieves pareto optimality , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[300]  Michael L. Honig,et al.  Two-cell power allocation for downlink CDMA , 2004, IEEE Transactions on Wireless Communications.

[301]  Leslie Lamport,et al.  Distributed snapshots: determining global states of distributed systems , 1985, TOCS.

[302]  J. Ben Atkinson,et al.  An Introduction to Queueing Networks , 1988 .

[303]  Zhisheng Niu,et al.  Joint power and rate control for wireless ad hoc networks: a game-theoretical approach with step-up pricing , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[304]  Olvi L. Mangasarian Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..

[305]  Mohammad Hayajneh,et al.  Distributed joint rate and power control game-theoretic algorithms for wireless data , 2004, IEEE Communications Letters.

[306]  Dusit Niyato,et al.  A Game-Theoretic Approach to Competitive Spectrum Sharing in Cognitive Radio Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[307]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[308]  G. S. Sodhi,et al.  Powder method for detecting latent fingerprints: a review. , 2001, Forensic science international.

[309]  Kin K. Leung,et al.  On the stability of distributed sequence adaptation for cellular asynchronous DS-CDMA systems , 2003, IEEE Trans. Inf. Theory.

[310]  Claudiu Danilov,et al.  The Spread Toolkit: Architecture and Performance , 2004 .

[311]  Steven Fortune,et al.  A sweepline algorithm for Voronoi diagrams , 1986, SCG '86.

[312]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[313]  S. Lasaulce,et al.  K-player Bayesian waterfilling game for fading multiple access channels , 2009, 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[314]  John Musacchio,et al.  Game Theoretic Modeling of WiFi Pricing , 2003 .

[315]  Makoto Yokoo,et al.  The distributed breakout algorithms , 2005, Artif. Intell..

[316]  Mingyan Liu,et al.  Revenue generation for truthful spectrum auction in dynamic spectrum access , 2009, MobiHoc '09.

[317]  Roman Barták,et al.  Constraint Processing , 2009, Encyclopedia of Artificial Intelligence.

[318]  Jerzy Konorski,et al.  Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.

[319]  Meritxell Vinyals,et al.  Divide-and-coordinate: DCOPs by agreement , 2010, AAMAS.

[320]  Amnon Meisels,et al.  Asynchronous Forward Bounding for Distributed COPs , 2014, J. Artif. Intell. Res..

[321]  Mérouane Debbah,et al.  Power allocation game for fading MIMO multiple access channels with antenna correlation , 2007, ValueTools '07.

[322]  Yi Chen,et al.  Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features , 2007 .

[323]  Meritxell Vinyals,et al.  Constructing a unifying theory of dynamic programming DCOP algorithms via the generalized distributive law , 2010, Autonomous Agents and Multi-Agent Systems.

[324]  Henrik I. Christensen,et al.  A game theoretic model for management of mobile sensors , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[325]  Denis Praca,et al.  From smart cards to smart objects: the road to new smart technologies , 2001, Comput. Networks.

[326]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[327]  Eitan Altman,et al.  CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.

[328]  M. Yokoo,et al.  Distributed Breakout Algorithm for Solving Distributed Constraint Satisfaction Problems , 1996 .

[329]  Vahab S. Mirrokni,et al.  On spectrum sharing games , 2004, PODC '04.

[330]  Valtteri Niemi,et al.  Privacy-preserving activity scheduling on mobile devices , 2011, CODASPY '11.

[331]  Tansu Alpcan,et al.  A hybrid systems model for power control in multicell wireless data networks , 2004, Perform. Evaluation.

[332]  Josep Domingo-Ferrer,et al.  Smart Card Research and Advanced Applications , 2000, IFIP — The International Federation for Information Processing.

[333]  Michael L. Littman,et al.  Graphical Models for Game Theory , 2001, UAI.

[334]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[335]  Ness B. Shroff,et al.  Utility maximization for communication networks with multipath routing , 2006, IEEE Transactions on Automatic Control.

[336]  Eitan Altman,et al.  Non-cooperative Forwarding in Ad-Hoc Networks , 2005, NETWORKING.

[337]  Xiaolei Ma,et al.  Vehicle Routing Problem , 2013 .

[338]  M. Utku Ünver,et al.  Increasing the Opportunity of Live Kidney Donation by Matching for Two- and Three-Way Exchanges , 2006, Transplantation.

[339]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[340]  Mark Handley,et al.  Towards high performance virtual routers on commodity hardware , 2008, CoNEXT '08.

[341]  Erkay Savas,et al.  Impossibility of unconditionally secure scalar products , 2009, Data Knowl. Eng..

[342]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[343]  Teng Joon Lim,et al.  Soft handoffs in CDMA mobile systems , 1997, IEEE Wirel. Commun..

[344]  Makoto Yokoo,et al.  Resource Constrained Distributed Constraint Optimization with Virtual Variables , 2008, AAAI.

[345]  Peter Marbach,et al.  Downlink resource allocation and pricing for wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[346]  Makoto Yokoo,et al.  Distributed Partial Constraint Satisfaction Problem , 1997, CP.

[347]  Sam Toueg,et al.  Asynchronous consensus and broadcast protocols , 1985, JACM.

[348]  W. J. Gordon,et al.  Closed Queuing Systems with Exponential Servers , 1967, Oper. Res..

[349]  Wei-Yun Yau,et al.  Fake Finger Detection by Finger Color Change Analysis , 2007, ICB.

[350]  Makoto Yokoo,et al.  A quantified distributed constraint optimization problem , 2010, AAMAS.

[351]  Jeffrey H. Reed,et al.  A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks , 2007 .

[352]  M. Chatterjee,et al.  An Economic Framework for Spectrum Allocation and Service Pricing with Competitive Wireless Service Providers , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[353]  Frank Kelly,et al.  Reversibility and Stochastic Networks , 1979 .

[354]  Mark Klein,et al.  Auctions and bidding: A guide for computer scientists , 2011, CSUR.

[355]  Mokshay M. Madiman,et al.  Cores of Cooperative Games in Information Theory , 2008, EURASIP J. Wirel. Commun. Netw..

[356]  Rahul Jain,et al.  Spectrum Sharing through Contracts , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[357]  Richard J. La,et al.  DIMACS Series in Discrete Mathematics and Theoretical Computer Science A Game-theoretic Look at the Gaussian Multiaccess Channel , 2022 .

[358]  David J. Goodman,et al.  Power control for wireless data based on utility and pricing , 1998, Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361).

[359]  Anil K. Jain,et al.  Biometric authentication : First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004 : proceedings , 2004 .

[360]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[361]  O. Simeone,et al.  A Game-Theoretic View on the Interference Channel with Random Access , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[362]  Daesung Moon,et al.  Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.

[363]  Michael L. Honig,et al.  Auction-Based Spectrum Sharing , 2006, Mob. Networks Appl..

[364]  Katerina J. Argyraki,et al.  RouteBricks: exploiting parallelism to scale software routers , 2009, SOSP '09.

[365]  Jean-François Mainguet,et al.  Fingerprint recognition based on silicon chips , 2000, Future Gener. Comput. Syst..

[366]  Stephen Fitzpatrick,et al.  An Experimental Assessment of a Stochastic, Anytime, Decentralized, Soft Colourer for Sparse Graphs , 2001, SAGA.

[367]  Ephraim Zehavi,et al.  Cooperative Game Theory and the Gaussian Interference Channel , 2007, IEEE Journal on Selected Areas in Communications.

[368]  Boi Faltings,et al.  MB-DPOP: A New Memory-Bounded Algorithm for Distributed Optimization , 2007, IJCAI.

[369]  Demosthenis Teneketzis,et al.  An Externalities-Based Decentralized Optimal Power Allocation Algorithm for Wireless Networks , 2009, IEEE/ACM Transactions on Networking.

[370]  Christian Cachin,et al.  State Machine Replication with Byzantine Faults , 2010, Replication.

[371]  F. Jondral,et al.  Dynamic and local combined pricing, allocation and billing system with cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[372]  Florian Kerschbaum Computation on Randomized Data , 2011 .

[373]  G.D. Stamoulis,et al.  Auction-based resource allocation in UMTS high speed downlink packet access (HSDPA) , 2005, Next Generation Internet Networks, 2005.

[374]  M. Chatterjee,et al.  An Economic Framework for Dynamic Spectrum Access and Service Pricing , 2009, IEEE/ACM Transactions on Networking.

[375]  Umberto Spagnolini,et al.  A Game-Theoretic Approach to Decentralized Interference-Avoidance Scheduling for Cellular Systems: Algorithm and Equilibria , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[376]  Xinbing Wang,et al.  A game approach for multi-channel allocation in multi-hop wireless networks , 2008, MobiHoc '08.

[377]  Yi Zhao,et al.  Fairness based resource allocation for uplink OFDMA systems , 2008 .

[378]  John M. Cioffi,et al.  SPC09-6: Band-Preference Dynamic Spectrum Management in a DSL Environment , 2006, IEEE Globecom 2006.

[379]  Pedro Meseguer,et al.  Cluster Tree Elimination for Distributed Constraint Optimization with Quality Guarantees , 2010, Fundam. Informaticae.

[380]  Zhu Han,et al.  Network Formation Games for Distributed Uplink Tree Construction in IEEE 802.16J Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[381]  Levente Buttyán,et al.  Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[382]  H. Vincent Poor,et al.  An energy-efficient approach to power control and receiver design in wireless data networks , 2005, IEEE Transactions on Communications.

[383]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[384]  Ephraim Zehavi,et al.  Bargaining Over the Interference Channel , 2006, 2006 IEEE International Symposium on Information Theory.

[385]  Walid Saad,et al.  Author manuscript, published in "IEEE Transactions on Wireless Communications (2009) Saad-ITransW-2009" A Distributed Coalition Formation Framework for Fair User Cooperation in Wireless Networks , 2022 .

[386]  E. Altman,et al.  An evolutionary game perspective to ALOHA with power control , 2005 .

[387]  M. Silaghi,et al.  Using Secure DisCSP Solvers for Generalized Vickrey Auctions ∗ Complete and Stochastic Secure Techniques , 2005 .

[388]  S. Barbarossa,et al.  Asynchronous Iterative Waterfilling for Gaussian Frequency-Selective Interference Channels: A Unified Framework , 2007, 2007 Information Theory and Applications Workshop.

[389]  Sven Leyffer,et al.  Solving multi-leader–common-follower games , 2010, Optim. Methods Softw..

[390]  Katia P. Sycara,et al.  No-commitment branch and bound search for distributed constraint optimization , 2006, AAMAS '06.

[391]  Robbert van Renesse,et al.  COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[392]  Liuba Shrira,et al.  HQ replication: a hybrid quorum protocol for byzantine fault tolerance , 2006, OSDI '06.

[393]  Levente Buttyán,et al.  Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.

[394]  Ephraim Zehavi,et al.  Bargaining over the interference channel with total power constraints , 2009, 2009 International Conference on Game Theory for Networks.

[395]  Michael Dahlin,et al.  Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults , 2009, NSDI.

[396]  Jean-Pierre Hubaux,et al.  Game Theory in Wireless Networks: A Tutorial , 2006 .

[397]  Jens Zander,et al.  Jamming games in slotted Aloha packet radio networks , 1990, IEEE Conference on Military Communications.

[398]  Frank Kelly,et al.  Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..

[399]  Peter Marbach,et al.  Bandwidth allocation in ad hoc networks: a price-based approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[400]  Michael P. Wellman,et al.  Computing approximate bayes-nash equilibria in tree-games of incomplete information , 2004, EC '04.

[401]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[402]  G. Croes A Method for Solving Traveling-Salesman Problems , 1958 .

[403]  B. Peleg,et al.  Strategy-proof voting schemes with continuous preferences , 1990 .

[404]  Tiina Heikkinen,et al.  On Congestion Pricing in a Wireless Network , 2002, Wirel. Networks.

[405]  Makoto Yokoo,et al.  Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..

[406]  Keith S. Decker,et al.  A complete distributed constraint optimization method for non-traditional pseudotree arrangements , 2007, AAMAS '07.

[407]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[408]  Stephen B. Wicker,et al.  A Duopoly Pricing Game for Wireless IP Services , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[409]  Christian Cachin,et al.  Secure INtrusion-Tolerant Replication on the Internet , 2002, Proceedings International Conference on Dependable Systems and Networks.

[410]  C. Barral,et al.  A Protection Scheme for MOC-Enabled Smart Cards , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[411]  Vincent W. S. Wong,et al.  Utility-optimal random access without message passing , 2009, IEEE Transactions on Wireless Communications.

[412]  Michael L. Honig,et al.  Sequential Bandwidth and Power Auctions for Distributed Spectrum Sharing , 2008, IEEE Journal on Selected Areas in Communications.

[413]  Christian Bessiere,et al.  DisChoco 2: A Platform for Distributed Constraint Reasoning , 2011 .

[414]  Zhu Han,et al.  Improved Wireless Secrecy Rate Using Distributed Auction Theory , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[415]  Byeong Gi Lee,et al.  Distributed Resource Allocation through Noncooperative Game Approach in Multi-cell OFDMA Systems , 2006, 2006 IEEE International Conference on Communications.

[416]  H. Vincent Poor,et al.  Energy-Efficient Resource Allocation in Wireless Networks , 2007, IEEE Signal Processing Magazine.

[417]  Guy Pujolle,et al.  Introduction to queueing networks , 1987 .

[418]  Sergio Barbarossa,et al.  Competitive Design of Multiuser MIMO Systems Based on Game Theory: A Unified View , 2008, IEEE Journal on Selected Areas in Communications.

[419]  Narayan B. Mandayam,et al.  Coalitional Games in Gaussian Interference Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[420]  John M. Cioffi,et al.  Rate and power control in a two-user multicarrier channel with no coordination: the optimal scheme versus a suboptimal method , 2003, IEEE Trans. Commun..

[421]  Boi Faltings,et al.  ODPOP: An Algorithm for Open/Distributed Constraint Optimization , 2006, AAAI.

[422]  Marko Vukolic,et al.  The next 700 BFT protocols , 2010, EuroSys '10.

[423]  Christian Bessiere,et al.  Distributed Dynamic Backtracking , 2001, CP.

[424]  Adam Duffy,et al.  A Biometric Identity Based Signature Scheme , 2007, Int. J. Netw. Secur..

[425]  Bo Li,et al.  Non-cooperative power control for wireless ad hoc networks with repeated games , 2007, IEEE Journal on Selected Areas in Communications.

[426]  Michael L. Honig,et al.  Utility-based power control for a two-cell CDMA data network , 2005, IEEE Transactions on Wireless Communications.

[427]  Makoto Yokoo,et al.  Dynamic DFS Tree in ADOPT-ing , 2007, AAAI.

[428]  Michael L. Honig,et al.  Forward-link resource allocation for a two-cell voice network with multiple service classes , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[429]  Eugene C. Freuder,et al.  Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving , 2005, Artif. Intell..

[430]  Ness B. Shroff,et al.  Downlink power allocation for multi-class CDMA wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[431]  Eytan Modiano,et al.  Wireless channel allocation using an auction algorithm , 2006, IEEE Journal on Selected Areas in Communications.

[432]  A. Lee Swindlehurst,et al.  Bargaining and the MISO Interference Channel , 2009, EURASIP J. Adv. Signal Process..

[433]  T. Charles Clancy,et al.  A multi-winner cognitive spectrum auction framework with collusion-resistant mechanisms , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[434]  Zhu Han,et al.  A selfish approach to coalition formation among unmanned air vehicles in wireless networks , 2009, 2009 International Conference on Game Theory for Networks.

[435]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[436]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[437]  Robbert van Renesse,et al.  Toward a cloud computing research agenda , 2009, SIGA.

[438]  Arun Ross,et al.  Toward reconstructing fingerprints from minutiae points , 2005, SPIE Defense + Commercial Sensing.

[439]  L. Shapley,et al.  Potential Games , 1994 .

[440]  Sven Koenig,et al.  BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm , 2008, AAMAS.