暂无分享,去创建一个
[1] Yang Feng,et al. Multi-Winner Contests for Strategic Diffusion in Social Networks , 2018, AAAI.
[2] Panagiotis Georgiadis,et al. Recommendation information diffusion in social networks considering user influence and semantics , 2016, Social Network Analysis and Mining.
[3] Yung-Ming Li,et al. A diffusion mechanism for social advertising over microblogs , 2012, Decis. Support Syst..
[4] Manuel Cebrián,et al. Finding red balloons with split contracts: robustness to individuals' selfishness , 2012, STOC '12.
[5] Jon M. Kleinberg,et al. Query incentive networks , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[6] Sergei Vassilvitskii,et al. On threshold behavior in query incentive networks , 2007, EC '07.
[7] Y. Narahari,et al. Threshold behavior of incentives in social networks , 2010, CIKM.
[8] Lisa Fleischer,et al. Simple sybil-proof mechanisms for multi-level marketing , 2012, 2012 Proceedings IEEE INFOCOM Workshops.
[9] Vincent Conitzer,et al. Using Mechanism Design to Prevent False-Name Manipulations , 2010, AI Mag..
[10] L. Christophorou. Science , 2018, Emerging Dynamics: Science, Energy, Society and Values.
[11] Bin Li,et al. Selling Multiple Items via Social Networks , 2018, AAMAS.
[12] Gareth J. F. Jones,et al. Proceedings of the 19th ACM international conference on Information and knowledge management , 2010, CIKM 2010.
[13] Zekeriya Erkin,et al. Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms , 2017, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[14] Kevin Leyton-Brown,et al. Proceedings of the 13th ACM Conference on Electronic Commerce, EC 2012, Valencia, Spain, June 4-8, 2012 , 2012, EC.
[15] Wei Chen,et al. Sybil-proof mechanisms in query incentive networks , 2013, EC '13.
[16] International Foundation for Autonomous Agents and MultiAgent Systems ( IFAAMAS ) , 2007 .
[17] Tim Roughgarden,et al. Proceedings of the 12th ACM conference on Electronic commerce , 2011, EC 2011.
[18] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[19] Y. Narahari,et al. Mechanism Design for Time Critical and Cost Critical Task Execution via Crowdsourcing , 2012, WINE.
[20] Zizhuo Wang,et al. A unified framework for dynamic pari-mutuel information market design , 2009, EC '09.
[21] J. Wyatt. Decision support systems. , 2000, Journal of the Royal Society of Medicine.
[22] J. Kleinberg. Algorithmic Game Theory: Cascading Behavior in Networks: Algorithmic and Economic Issues , 2007 .
[23] Alex Pentland,et al. Time-Critical Social Mobilization , 2010, Science.
[24] Bin Li,et al. Mechanism Design in Social Networks , 2016, AAAI.
[25] Shimeng Yu,et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY , 2016, Journal of Computer Science and Technology.
[26] Paul Resnick,et al. Proceedings of the 8th ACM conference on Electronic commerce , 2007, EC 2010.
[27] Vincent Conitzer,et al. False-Name-Proofness in Social Networks , 2010, WINE.
[28] Sven Seuken,et al. Sybil-proof accounting mechanisms with transitive trust , 2014, AAMAS.
[29] Moshe Tennenholtz,et al. Mechanisms for multi-level marketing , 2011, EC '11.