暂无分享,去创建一个
[1] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[2] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[3] Amnon Meisels,et al. Asymmetric Distributed Constraint Optimization , 2009 .
[4] Makoto Yokoo,et al. Distributed Private Constraint Optimization , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[5] Christoph Böhm,et al. The Basic Applications , 2013 .
[6] Milind Tambe,et al. Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.
[7] Makoto Yokoo,et al. Distributed constraint satisfaction for formalizing distributed problem solving , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.
[8] Marius-Calin Silaghi. Hiding Absence of Solution for a Distributed Constraint Satisfaction Problem , 2005, FLAIRS Conference.
[9] Francisco Azevedo,et al. Recent advances in constraints : 11th Annual ERCIM International Workshop on Constraint Solving and Contraint [i.e. Constraint] Logic Programming, CSCLP 2006 Caparica, Portugal, June 26-28, 2006 : revised selected and invited papers , 2007 .
[10] Boi Faltings,et al. Privacy-Preserving Multi-agent Constraint Satisfaction , 2009, 2009 International Conference on Computational Science and Engineering.
[11] Milind Tambe,et al. Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.
[12] Makoto Yokoo,et al. Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..
[13] Francesca Rossi,et al. Multi‐Agent Constraint Systems with Preferences: Efficiency, Solution Quality, and Privacy Loss , 2004, Comput. Intell..
[14] To-Yat Cheung,et al. Graph Traversal Techniques and the Maximum Flow Problem in Distributed Computation , 1983, IEEE Transactions on Software Engineering.
[15] Amnon Meisels,et al. Asynchronous Forward-checking for DisCSPs , 2007, Constraints.
[16] Marius-Calin Silaghi,et al. Asynchronous Search with Aggregations , 2000, AAAI/IAAI.
[17] Daphne Koller,et al. Multi-agent algorithms for solving graphical games , 2002, AAAI/IAAI.
[18] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[19] M. Silaghi,et al. Using Secure DisCSP Solvers for Generalized Vickrey Auctions ∗ Complete and Stochastic Secure Techniques , 2005 .
[20] Katia P. Sycara,et al. No-commitment branch and bound search for distributed constraint optimization , 2006, AAMAS '06.
[21] Amnon Meisels,et al. Completeness and Performance Of The APO Algorithm , 2008, J. Artif. Intell. Res..
[22] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[23] Boi Faltings,et al. Privacy Guarantees through Distributed Constraint Satisfaction , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[24] Eugene C. Freuder,et al. Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving , 2005, Artif. Intell..
[25] Makoto Yokoo,et al. Distributed Partial Constraint Satisfaction Problem , 1997, CP.
[26] Pedro Meseguer,et al. Distributed Forward Checking May Lie for Privacy , 2006, CSCLP.
[27] Boi Faltings,et al. Secure Combinatorial Optimization Simulating DFS Tree-Based Variable Elimination , 2006, AI&M.
[28] Radoslaw Szymanek,et al. FRODO 2.0: An Open-Source Framework for Distributed Constraint Optimization , 2009, IJCAI 2009.
[29] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[30] Yoav Shoham,et al. Towards a universal test suite for combinatorial auction algorithms , 2000, EC '00.
[31] Amnon Meisels,et al. Asynchronous Forward-Bounding for Distributed Constraints Optimization , 2006, ECAI.
[32] Bart De Decker,et al. On Securely Scheduling a Meeting , 2001, SEC.
[33] Amnon Meisels,et al. Concurrent Dynamic Backtracking for Distributed CSPs , 2004, CP.
[34] Pedro Meseguer,et al. Cluster Tree Elimination for Distributed Constraint Optimization with Quality Guarantees , 2010, Fundam. Informaticae.
[35] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[36] Milind Tambe,et al. Taking DCOP to the real world: efficient complete solutions for distributed multi-event scheduling , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[37] Boi Faltings,et al. A Scalable Method for Multiagent Constraint Optimization , 2005, IJCAI.
[38] Boi Faltings,et al. Coordinating Logistics Operations with Privacy Guarantees , 2011, IJCAI.
[39] Adi Shamir,et al. How to share a secret , 1979, CACM.
[40] Robert N. Lass,et al. DCOPolis : A Framework for Simulating and Deploying Distributed Constraint Optimization Algorithms , 2007 .
[41] Sven Koenig,et al. BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm , 2008, AAMAS.
[42] S. Rassenti,et al. A Combinatorial Auction Mechanism for Airport Time Slot Allocation , 1982 .
[43] Yiannis Tsiounis,et al. On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.
[44] B. Grosz,et al. SSDPOP : Using Secret Sharing to Improve the Privacy of DCOP , 2007 .
[45] Victor Lesser,et al. A Mediation Based Protocol for Distributed Constraint Satisfaction , 2003 .
[46] Roman Barták,et al. Constraint Processing , 2009, Encyclopedia of Artificial Intelligence.
[47] Meritxell Vinyals,et al. Constructing a unifying theory of dynamic programming DCOP algorithms via the generalized distributive law , 2010, Autonomous Agents and Multi-Agent Systems.
[48] Makoto Yokoo,et al. Asynchronous Weak-commitment Search for Solving Distributed Constraint Satisfaction Problems , 1995, CP.
[49] Pedro Meseguer,et al. Distributed Forward Checking , 2003, CP.
[50] Amnon Meisels,et al. Concurrent Forward Bounding for DCOPs , 2010 .
[51] Makoto Yokoo,et al. Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..
[52] Pedro Meseguer,et al. BnB-ADOPT+ with Several Soft Arc Consistency Levels , 2010, ECAI.
[53] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[54] Marius-Calin Silaghi,et al. Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..
[55] Boi Faltings,et al. M-DPOP: Faithful Distributed Implementations of Efficient Social Choice Problems , 2008 .
[56] Valtteri Niemi,et al. Privacy-preserving activity scheduling on mobile devices , 2011, CODASPY '11.
[57] Michael L. Littman,et al. Graphical Models for Game Theory , 2001, UAI.
[58] Michael P. Wellman,et al. Computing approximate bayes-nash equilibria in tree-games of incomplete information , 2004, EC '04.
[59] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.