Sciweavers

5456 search results - page 69 / 1092
» General Equilibrium Theory
Sort
View
108
Voted
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
ESA
2009
Springer
111views Algorithms» more  ESA 2009»
15 years 8 months ago
Exact and Approximate Equilibria for Optimal Group Network Formation
We consider a process called Group Network Formation Game, which represents the scenario when strategic agents are building a network together. In our game, agents can have extrem...
Elliot Anshelevich, Bugra Caskurlu
97
Voted
ATAL
2007
Springer
15 years 7 months ago
Sequential decision making in parallel two-sided economic search
This paper presents a two-sided economic search model in which agents are searching for beneficial pairwise partnerships. In each search stage, each of the agents is randomly mat...
David Sarne, Teijo Arponen
WIOPT
2006
IEEE
15 years 7 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
CORR
2010
Springer
168views Education» more  CORR 2010»
15 years 1 months ago
Competition of Wireless Providers for Atomic Users
We study a problem where wireless service providers compete for heterogenous and atomic (non-infinitesimal) wireless users. The users differ in their utility functions as well as ...
Vojislav Gajic, Jianwei Huang, Bixio Rimoldi