


default search action
1st WINE 2005: Hong Kong, China
- Xiaotie Deng, Yinyu Ye:

Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3828, Springer 2005, ISBN 3-540-30900-4
Invited Talks
- Christos H. Papadimitriou:

Recent Developments in Equilibria Algorithms. 1-2 - Ehud Kalai:

Partially-Specified Large Games. 3-13
Regular Contributions
- Yinyu Ye:

Exchange Market Equilibria with Leontief's Utility: Freedom of Pricing Leads to Rationality. 14-23 - Dinesh Garg, Kamal Jain, Kunal Talwar, Vijay V. Vazirani:

A Primal-Dual Algorithm for Computing Fisher Equilibrium in the Absence of Gross Substitutability Property. 24-33 - Nicole Immorlica, Kamal Jain, Mohammad Mahdian, Kunal Talwar:

Click Fraud Resistant Methods for Learning Click-Through Rates. 34-45 - Georgios Kouroupas, Elias Koutsoupias, Christos H. Papadimitriou, Martha Sideri:

Experiments with an Economic Model of the Worldwide Web. 46-54 - Nicole Immorlica, Li (Erran) Li, Vahab S. Mirrokni, Andreas S. Schulz:

Coordination Mechanisms for Selfish Scheduling. 55-69 - Tallichetty S. Chandrashekar, Yadati Narahari:

Economic Mechanisms for Shortest Path Cooperative Games with Incomplete Information. 70-79 - Fang Wu, Li Zhang, Bernardo A. Huberman:

Truth-Telling Reservations. 80-91 - Subhash Khot, Richard J. Lipton, Evangelos Markakis, Aranyak Mehta:

Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions. 92-101 - Sanjiv Kapoor, Aranyak Mehta, Vijay V. Vazirani:

An Auction-Based Market Equilibrium Algorithm for a Production Model. 102-111 - Mikolaj Morzy

:
New Algorithms for Mining the Reputation of Participants of Online Auctions. 112-121 - Kamal Jain, Aranyak Mehta, Kunal Talwar, Vijay V. Vazirani:

A Simple Characterization for Truth-Revealing Single-Item Auctions. 122-128 - Amir Ronen, Lyron Wahrmann:

Prediction Games. 129-140 - Ning Chen, Atri Rudra:

Walrasian Equilibrium: Hardness, Approximations and Tractable Instances. 141-150 - Simon Fischer, Berthold Vöcking:

On the Structure and Complexity of Worst-Case Equilibria. 151-160 - Wai-Yin Ng, Dah Ming Chiu, W. K. Lin:

Club Formation by Rational Sharing: Content, Viability and Community Structure. 161-173 - Joan Feigenbaum, David R. Karger

, Vahab S. Mirrokni, Rahul Sami:
Subjective-Cost Policy Routing. 174-183 - Shridhar Mubaraq Mishra, John Hwang, Dick Filippini, Reza Moazzami, Lakshminarayanan Subramanian, Tom Du:

Economic Analysis of Networking Technologies for Rural Developing Regions. 184-194 - Robert Elsässer, Martin Gairing, Thomas Lücking, Marios Mavronicolas

, Burkhard Monien:
A Simple Graph-Theoretic Model for Selfish Restricted Scheduling. 195-209 - Marios Mavronicolas

, Panagiota N. Panagopoulou, Paul G. Spirakis:
A Cost Mechanism for Fair Pricing of Resource Usage. 210-224 - Yanni Ellen Liu, Xiao Huan Liu:

A Delay Pricing Scheme for Real-Time Delivery in Deadline-Based Networks. 225-235 - Alexander Kesselman, Stefano Leonardi, Vincenzo Bonifaci

:
Game-Theoretic Analysis of Internet Switching with Selfish Users. 236-245 - Xiaolei Guo

, Hai Yang:
The Price of Anarchy of Cournot Oligopoly. 246-257 - Gabrielle Demange:

Incentives in Some Coalition Formation Games. 258-267 - Radu Jurca, Boi Faltings:

Enforcing Truthful Strategies in Incentive Compatible Reputation Mechanisms. 268-277 - Takayuki Suyama, Makoto Yokoo:

Strategy/False-Name Proof Protocols for Combinatorial Multi-attribute Procurement Auction: Handling Arbitrary Utility of the Buyer. 278-287 - Yunlei Zhao, Robert H. Deng

, Binyu Zang, Yiming Zhao:
Practical Zero-Knowledge Arguments from Sigma-Protocols. 288-298 - Takashi Matsuhisa

, Paul Strokan:
Bayesian Communication Leading to a Nash Equilibrium in Belief. 299-306 - Lili Ding, Yinfeng Xu, Shuhua Hu:

The Bahncard Problem with Interest Rate and Risk. 307-314 - Hai Yu, Shouyang Wang

, Chuangyin Dang:
Optimal Starting Price in Online Auctions. 315-324 - Pascal Kurtansky, Burkhard Stiller:

Time Interval-Based Prepaid Charging of QoS-Enabled IP Services. 325-335 - Lean Yu, Shouyang Wang

, Kin Keung Lai
:
Mining Stock Market Tendency Using GA-Based Support Vector Machines. 336-345 - Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi

:
Model-Based Analysis of Money Accountability in Electronic Purses. 346-355 - Yukun Cao, Yunfeng Li, Xiaofeng Liao:

Applying Modified Fuzzy Neural Network to Customer Classification of E-Business. 356-365 - Qin Liao, Huimin Gu, Zhifeng Hao, Zhonghua Tang:

Fuzzy Comprehensive Evaluation of E-commerce and Process Improvement. 366-374 - Jichang Dong, Wuyi Yue:

Application of Integrated Web Services-Based E-business and Web Services-Based Business Process Monitoring. 375-384 - Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu:

A Note on the Cramer-Damgård Identification Scheme. 385-390 - Kaile Su

, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen:
Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System. 391-404 - Eun-Jun Yoon, Kee-Young Yoo:

Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. 405-413 - Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo:

New Authentication Protocol Providing User Anonymity in Open Network. 414-423 - Arindam Chakrabarti:

Effective Filtering for Collaborative Publishing. 424-433 - Kay-Yut Chen, Tad Hogg:

Experimental Evaluation of an eBay-Style Self-reporting Reputation Mechanism. 434-443 - Alfredo Milani

, Stefano Marcugini:
An Architecture for Evolutionary Adaptive Web Systems. 444-454 - Jun Wang, Yong-Hong Sun, Zhi-Ping Fan, Yan Liu:

A Collaborative E-learning System Based on Multi-agent. 455-463 - Wei-Guo Zhang, Wen An Liu, Ying-Luo Wang:

A Class of Possibilistic Portfolio Selection Models and Algorithms. 464-472 - Bernard Fong, Alvis Cheuk M. Fong, Guan Y. Hong

, Louisa Wong:
An Empirical Study of Volatility Predictions: Stock Market Analysis Using Neural Networks. 473-480 - Ping Li, Peng Shi, Guangdong Huang:

A New Algorithm Based on Copulas for Financial Risk Calculation with Applications to Chinese Stock Markets. 481-490 - Myung-hee Kang, Hwang-Bin Ryou, WoongChul Choi:

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments. 491-499 - Robert W. Zhu, Guomin Yang

, Duncan S. Wong:
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. 500-509 - Hung Chim:

To Build a Blocklist Based on the Cost of Spam. 510-519 - Qizhi Fang, Hye Kyung Kim, Dae Sik Lee:

Total Dominating Set Games. 520-530 - Franco Salvetti, Savitha Srinivasan:

Local Flow Betweenness Centrality for Clustering Community Graphs. 531-544 - Yijun Liu, Xijin Tang:

Computerized Collaborative Support for Enhancing Human's Creativity for Networked Community. 545-553 - Yinfeng Xu, Chunlin Xin, Fanglei Yi:

New Results on Online Replacement Problem. 554-563 - Wun-Tat Chan, Francis Y. L. Chin, Deshi Ye, Guochuan Zhang

, Yong Zhang:
Online Bin Packing of Fragile Objects with Application in Cellular Networks. 564-573 - Maolin Hu, Yinfeng Xu, Weijun Xu:

Online Algorithms for the Vehicle Scheduling Problem with Time Objective. 574-583 - Anthony Man-Cho So

, Yinyu Ye:
On Solving Coverage Problems in a Wireless Sensor Network Using Voronoi Diagrams. 584-593 - Ming Yang, Renfeng Xiao:

A Computational Model of Mortgage Prepayment Options. 594-601 - Masashi Kiyomi

, Takeaki Uno, Tomomi Matsui
:
Efficient Algorithms for the Electric Power Transaction Problem. 602-611 - Zhongfei Li, Kai W. Ng:

Looking for Arbitrage or Term Structures in Frictional Markets. 612-621 - Zhi-Ping Fan, Yong Feng, Yong-Hong Sun, Bo Feng, Tian-Hui You:

A Framework on Compound Knowledge Push System Oriented to Organizational Employees. 622-630 - Satoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara

:
Effective Decision Making by Self-evaluation in the Multi-agent Environment. 631-640 - Chongying Cao, Jing Yang, Guoqing Zhang:

Overlay Based Mapping Egress Service Path Between MPLS Domains. 641-650 - Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, Wendong Wang:

An Adaptive Group-Based Reputation System in Peer-to-Peer Networks. 651-659 - Kanliang Wang, Yuan Wang, Jingtao Yao:

A Comparative Study on Marketing Mix Models for Digital Products. 660-669 - Xun Liang

, Yang Bo He:
Optimal Pricing for Web Search Engines. 670-679 - Li-jun Li, Xiao-yuan Huang, Li-ping Yu, Bo Xu:

Pricing Strategy of Mixed Traditional and Online Distribution Channels Based on Stackelberg Game. 680-687 - Mohamed Saad

, Tamás Terlaky
, Anthony Vannelli, Hu Zhang:
Packing Trees in Communication Networks. 688-697 - Eric Angel, Evripidis Bampis, Fanny Pascual:

Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines. 698-707 - Adrian Petcu, Boi Faltings:

Incentive Compatible Multiagent Constraint Optimization. 708-717 - Dinesh Garg, Yadati Narahari:

Design of Incentive Compatible Mechanisms for Stackelberg Problems. 718-727 - Ishai Menache, Nahum Shimkin:

Proportional QoS in Differentiated Services Networks: Capacity Management, Equilibrium Analysis and Elastic Demands. 728-737 - Gireesh Shrimali

, Sunil Kumar:
Can "Bill-and-Keep" Peering Be Mutually Beneficial?. 738-747 - Yong-Hyuk Moon, Byungsang Kim, Chan-Hyun Youn:

Design of P2P Grid Networking Architecture Using k-Redundancy Scheme Based Group Peer Concept. 748-757 - Aihua Li

, Yong Shi:
An Integrated Classification Method: Combination of LP and LDA. 758-767 - Peng Du, Yanmei Li, Weixuan Xu:

Cooperation Evolution of Indirect Reciprocity by Discrimination. 768-776 - Zhi-Chun Li

, Hai-Jun Huang
:
Fixed-Point Model and Schedule Reliability of Morning Commuting in Stochastic and Time-Dependent Transport Networks. 777-787 - Kamal Jain, Mohammad Mahdian:

Computing Equilibria in a Fisher Market with Linear Single-Constraint Production Units. 788-792 - Lihua Chen, Qiwen Wang:

Majority Equilibrium of Distribution Centers Allocation in Supply Chain Management. 793-800 - MinSeok Jang, Weon-Goo Kim, Yon-sik Lee, Jongwook Woo:

Traversal Pattern Mining in Web Environment. 801-805 - Yun-Fang Juan, Chi-Chao Chang:

An Analysis of Search Engine Switching Behavior Using Click Streams. 806-815 - Lingling Zhang, Jun Li, Yong Shi:

Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive Organization. 816-825 - Juan K. Lin:

Traffic Models for Community-Based Ranking and Navigation. 826-835 - Byung-Cheol Kim, Jonathan K. Shapiro:

On the Efficacy of Detecting and Punishing Selfish Peers. 836-847 - JinHong Kim, Eunseok Lee

:
Semantic Web Recommender System Based Personalization Service for User XQuery Pattern. 848-857 - Andrea Giovannucci

, Juan A. Rodríguez-Aguilar
, Jesús Cerquides
:
Multi-unit Combinatorial Reverse Auctions with Transformability Relationships Among Goods. 858-867 - Sampath Kameshwaran, Lyès Benyoucef, Xiaolan Xie:

Winner Determination in Discount Auctions. 868-877 - Uriel Feige, Abraham Flaxman, Jason D. Hartline, Robert D. Kleinberg:

On the Competitive Ratio of the Random Sampling Auction. 878-886 - Xianjia Wang, Yalin Chen, Wenqi Zhu:

The Pricing Strategies for Agents in Real E-commerce. 887-894 - Qianqin Chen, Wei-Guo Zhang, Guoliang Kuang:

Why Do Information Gatekeepers Charge Zero Subscription Fees? 895-905 - Lei Cao, Minglu Li, Jian Cao:

Cost-Driven Web Service Selection Using Genetic Algorithm. 906-915 - Yufeng Wang, Wendong Wang:

On Modeling Internet QoS Provisioning from Economic Models. 916-925 - Taehan Kim, Sang-Chan Park:

Metadata and Information Asset for Infomediary Business Model on Primary Product Market. 926-935 - Xinli Huang, Fanyuan Ma, Wenju Zhang, Yin Li:

On Protection of Threatened Unstructured Overlays: An Economic Defense Model and Its Applications. 936-946 - Wen Ding, William Yurcik, Xiaoxin Yin:

Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. 947-958 - Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang:

Secure Construction of Virtual Organizations in Grid Computing Systems. 959-968 - Marios Mavronicolas

, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis:
A Graph-Theoretic Network Security Game. 969-978 - Weizhao Wang, Xiang-Yang Li, Xiaowen Chu

:
Nash Equilibria and Dominant Strategies in Routing. 979-988 - Spyros C. Kontogiannis

, Paul G. Spirakis:
Atomic Selfish Routing in Networks: A Survey. 989-1002 - Louis Lei Yu, Eric G. Manning, Kin F. Li:

Heuristic Approaches to Service Level Agreements in Packet Networks. 1003-1012 - Li-Sha Huang:

A Fixed Point Approach for the Computation of Market Equilibria. 1013-1022 - Vincenzo Bonifaci

, Ugo Di Iorio, Luigi Laura
:
New Results on the Complexity of Uniformly Mixed Nash Equilibria. 1023-1032 - George F. Georgakopoulos, Dimitris J. Kavvadias, Leonidas G. Sioutis:

Nash Equilibria in All-Optical Networks. 1033-1045 - Nikhil R. Devanur, Naveen Garg

, Rohit Khandekar, Vinayaka Pandit, Amin Saberi, Vijay V. Vazirani:
Price of Anarchy, Locality Gap, and a Network Service Provider Game. 1046-1055 - HyoJoo Park, TaeYong Kim, SaJoong Kim:

Network Traffic Analysis and Modeling for Games. 1056-1065 - Dinesh Garg, Yadati Narahari:

Price of Anarchy of Network Routing Games with Incomplete Information. 1066-1075 - Hui Huang, Shunming Zhang:

General Equilibrium for Economies with Harmful Overconsumption. 1076-1086 - Jaroslav Zajac:

Expectations, Asymmetries, and Contributions. 1087-1093 - Xiaodao Wu, Yanfeng Sun, Yanchun Liang:

A Quantile-Data Mapping Model for Value-at-Risk Based on BP and Support Vector Regression. 1094-1102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














