Sciweavers

74 search results - page 15 / 15
» k-symmetry model for identity anonymization in social networ...
Sort
View
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
13 years 9 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
13 years 10 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
SAGT
2009
Springer
176views Game Theory» more  SAGT 2009»
13 years 11 months ago
Bayesian Auctions with Friends and Foes
We study auctions whose bidders are embedded in a social or economic network. As a result, even bidders who do not win the auction themselves might derive utility from the auction,...
Po-An Chen, David Kempe
ESA
2007
Springer
153views Algorithms» more  ESA 2007»
13 years 8 months ago
Tradeoffs and Average-Case Equilibria in Selfish Routing
We consider the price of selfish routing in terms of tradeoffs and from an average-case perspective. Each player in a network game seeks to send a message with a certain length by...
Martin Hoefer, Alexander Souza