Algorithmic Mechanisms for Reliable Master-Worker Internet-Based Computing
暂无分享,去创建一个
Chryssis Georgiou | Antonio Fernández | Miguel A. Mosteiro | Evgenia Christoforou | Antonio Fernández | Chryssis Georgiou | Evgenia Christoforou
[1] R. Rosenthal. A class of games possessing pure-strategy Nash equilibria , 1973 .
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[4] Paul G. Spirakis,et al. The Price of Selfish Routing , 2001, STOC '01.
[5] Francine Berman,et al. Models and scheduling mechanisms for global computing applications , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[6] Dimitris Fotakis,et al. Memoryless facility location in one pass , 2006, TALG.
[7] Ittai Abraham,et al. Distributed computing meets game theory: combining insights from two fields , 2011, SIGA.
[8] Michael Dahlin,et al. FlightPath: Obedience vs. Choice in Cooperative Services , 2008, OSDI.
[9] Stefan Schmid,et al. On the windfall of friendship: inoculation strategies on social networks , 2008, EC '08.
[10] Vahab S. Mirrokni,et al. On spectrum sharing games , 2004, PODC '04.
[11] David C. Parkes,et al. Rationality and Self-Interest in Peer to Peer Networks , 2003, IPTPS.
[12] David P. Anderson,et al. SETI@home-massively distributed computing for SETI , 2001, Comput. Sci. Eng..
[13] Michael Dahlin,et al. BAR fault tolerance for cooperative services , 2005, SOSP '05.
[14] Steve Chien,et al. Convergence to approximate Nash equilibria in congestion games , 2007, SODA '07.
[15] Stefan Schmid,et al. Distributed asymmetric verification in computational grids , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[16] Chryssis Georgiou,et al. Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion ⋆ , 2009 .
[17] Chryssis Georgiou,et al. Designing Mechanisms for Reliable Internet-based Computing , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[18] A. Mas-Colell,et al. Microeconomic Theory , 1995 .
[19] Martin Hoefer,et al. Altruism in Atomic Congestion Games , 2013, TEAC.
[20] Chryssis Georgiou,et al. Reliably Executing Tasks in the Presence of Untrusted Entities , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).
[21] Luis F. G. Sarmenta,et al. Sabotage-tolerance mechanisms for volunteer computing systems , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.
[22] W. G. Horner,et al. A new method of solving numerical equations of all orders, by continuous approximation , 1815 .
[23] Petr Kuznetsov,et al. Towards Network Games with Social Preferences , 2010, SIROCCO.
[24] David P. Anderson,et al. BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.
[25] Jörgen W. Weibull,et al. Evolutionary Game Theory , 1996 .
[26] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[27] Csaba Szepesvári,et al. Algorithms for Reinforcement Learning , 2010, Synthesis Lectures on Artificial Intelligence and Machine Learning.
[28] Gilles Fedak,et al. Characterizing Result Errors in Internet Desktop Grids , 2007, Euro-Par.
[29] Bruce Bueno de Mesquita,et al. An Introduction to Game Theory , 2014 .
[30] Tim Roughgarden,et al. How bad is selfish routing? , 2002, JACM.
[31] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[32] Kenichi Hagihara,et al. Computing Low Latency Batches with Unreliable Workers in Volunteer Computing Environments , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[33] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[34] John R. Douceur,et al. Lottery trees: motivational deployment of networked systems , 2007, SIGCOMM '07.
[35] Sanguthevar Rajasekaran,et al. Robust Network Supercomputing with Malicious Processes , 2006, DISC.
[36] Josef Hofbauer,et al. Evolutionary Games and Population Dynamics , 1998 .
[37] Jonathan Bendor,et al. Aspiration-Based Reinforcement Learning in Repeated Interaction Games: an Overview , 2001, IGTR.
[38] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[39] Stefan Schmid,et al. Combinatorial agency with audits , 2009, 2009 International Conference on Game Theory for Networks.
[40] Ian T. Foster,et al. On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing , 2003, IPTPS.
[41] K. Eliaz. Fault Tolerant Implementation , 2002 .
[42] Dirk Ifenthaler,et al. Stochastic Models of Learning , 2012 .
[43] David P. Anderson,et al. Homogeneous redundancy: a technique to ensure integrity of molecular simulation results using public computing , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[44] G. Mailath,et al. Repeated Games and Reputations: Long-Run Relationships , 2006 .
[45] Christos H. Papadimitriou,et al. Worst-case equilibria , 1999 .
[46] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[47] Moshe Babaioff,et al. Congestion games with malicious players , 2007, EC '07.
[48] S. Wong. An authentication protocol in Web-computing , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[49] Elias Koutsoupias,et al. Mechanism Design for Scheduling , 2009, Bull. EATCS.
[50] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[51] Moshe Tennenholtz,et al. k-Implementation , 2003, EC '03.
[52] David P. Anderson,et al. Performance Prediction and Analysis of BOINC Projects: An Empirical Study with EmBOINC , 2009, Journal of Grid Computing.
[53] Noam Nisan,et al. Algorithmic Mechanism Design , 2001, Games Econ. Behav..
[54] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[55] Moshe Babaioff,et al. Combinatorial agency , 2006, ACM Conference on Economics and Computation.
[56] Moshe Babaioff,et al. Mixed Strategies in Combinatorial Agency , 2006, WINE.
[57] Chryssis Georgiou,et al. Algorithmic mechanisms for internet-based master-worker computing with untrusted and selfish workers , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).
[58] Joseph Y. Halpern. Computer Science and Game Theory: A Brief Survey , 2007, ArXiv.
[59] C. Cannings,et al. Evolutionary Game Theory , 2010 .
[60] Stefan Schmid,et al. When selfish meets evil: byzantine players in a virus inoculation game , 2006, PODC '06.
[61] Arnold L. Rosenberg,et al. On the cost-ineffectiveness of redundancy in commercial P2P computing , 2005, CCS '05.
[62] George Karakostas,et al. Equilibria for networks with malicious users , 2007, ISAAC.
[63] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[64] Moshe Babaioff,et al. Free-Riding and Free-Labor in Combinatorial Agency , 2009, SAGT.
[65] Michael Dahlin,et al. BAR gossip , 2006, OSDI '06.
[66] Noga Alon,et al. Bayesian ignorance , 2010, PODC '10.
[67] Martin Gairing,et al. Malicious Bayesian Congestion Games , 2008, WAOA.