![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
1st WINE 2005: Hong Kong, China
- Xiaotie Deng, Yinyu Ye:
Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3828, Springer 2005, ISBN 3-540-30900-4
Invited Talks
- Christos H. Papadimitriou:
Recent Developments in Equilibria Algorithms. 1-2 - Ehud Kalai:
Partially-Specified Large Games. 3-13
Regular Contributions
- Yinyu Ye:
Exchange Market Equilibria with Leontief's Utility: Freedom of Pricing Leads to Rationality. 14-23 - Dinesh Garg, Kamal Jain, Kunal Talwar, Vijay V. Vazirani:
A Primal-Dual Algorithm for Computing Fisher Equilibrium in the Absence of Gross Substitutability Property. 24-33 - Nicole Immorlica, Kamal Jain, Mohammad Mahdian, Kunal Talwar:
Click Fraud Resistant Methods for Learning Click-Through Rates. 34-45 - Georgios Kouroupas, Elias Koutsoupias, Christos H. Papadimitriou, Martha Sideri:
Experiments with an Economic Model of the Worldwide Web. 46-54 - Nicole Immorlica, Li (Erran) Li, Vahab S. Mirrokni, Andreas S. Schulz:
Coordination Mechanisms for Selfish Scheduling. 55-69 - Tallichetty S. Chandrashekar, Yadati Narahari:
Economic Mechanisms for Shortest Path Cooperative Games with Incomplete Information. 70-79 - Fang Wu, Li Zhang, Bernardo A. Huberman:
Truth-Telling Reservations. 80-91 - Subhash Khot, Richard J. Lipton, Evangelos Markakis, Aranyak Mehta:
Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions. 92-101 - Sanjiv Kapoor, Aranyak Mehta, Vijay V. Vazirani:
An Auction-Based Market Equilibrium Algorithm for a Production Model. 102-111 - Mikolaj Morzy
:
New Algorithms for Mining the Reputation of Participants of Online Auctions. 112-121 - Kamal Jain, Aranyak Mehta, Kunal Talwar, Vijay V. Vazirani:
A Simple Characterization for Truth-Revealing Single-Item Auctions. 122-128 - Amir Ronen, Lyron Wahrmann:
Prediction Games. 129-140 - Ning Chen, Atri Rudra:
Walrasian Equilibrium: Hardness, Approximations and Tractable Instances. 141-150 - Simon Fischer, Berthold Vöcking:
On the Structure and Complexity of Worst-Case Equilibria. 151-160 - Wai-Yin Ng, Dah Ming Chiu, W. K. Lin:
Club Formation by Rational Sharing: Content, Viability and Community Structure. 161-173 - Joan Feigenbaum, David R. Karger
, Vahab S. Mirrokni, Rahul Sami:
Subjective-Cost Policy Routing. 174-183 - Shridhar Mubaraq Mishra, John Hwang, Dick Filippini, Reza Moazzami, Lakshminarayanan Subramanian, Tom Du:
Economic Analysis of Networking Technologies for Rural Developing Regions. 184-194 - Robert Elsässer, Martin Gairing, Thomas Lücking, Marios Mavronicolas
, Burkhard Monien:
A Simple Graph-Theoretic Model for Selfish Restricted Scheduling. 195-209 - Marios Mavronicolas
, Panagiota N. Panagopoulou, Paul G. Spirakis:
A Cost Mechanism for Fair Pricing of Resource Usage. 210-224 - Yanni Ellen Liu, Xiao Huan Liu:
A Delay Pricing Scheme for Real-Time Delivery in Deadline-Based Networks. 225-235 - Alexander Kesselman, Stefano Leonardi, Vincenzo Bonifaci
:
Game-Theoretic Analysis of Internet Switching with Selfish Users. 236-245 - Xiaolei Guo
, Hai Yang:
The Price of Anarchy of Cournot Oligopoly. 246-257 - Gabrielle Demange:
Incentives in Some Coalition Formation Games. 258-267 - Radu Jurca, Boi Faltings:
Enforcing Truthful Strategies in Incentive Compatible Reputation Mechanisms. 268-277 - Takayuki Suyama, Makoto Yokoo:
Strategy/False-Name Proof Protocols for Combinatorial Multi-attribute Procurement Auction: Handling Arbitrary Utility of the Buyer. 278-287 - Yunlei Zhao, Robert H. Deng
, Binyu Zang, Yiming Zhao:
Practical Zero-Knowledge Arguments from Sigma-Protocols. 288-298 - Takashi Matsuhisa
, Paul Strokan:
Bayesian Communication Leading to a Nash Equilibrium in Belief. 299-306 - Lili Ding, Yinfeng Xu, Shuhua Hu:
The Bahncard Problem with Interest Rate and Risk. 307-314 - Hai Yu, Shouyang Wang
, Chuangyin Dang:
Optimal Starting Price in Online Auctions. 315-324 - Pascal Kurtansky, Burkhard Stiller:
Time Interval-Based Prepaid Charging of QoS-Enabled IP Services. 325-335 - Lean Yu, Shouyang Wang
, Kin Keung Lai
:
Mining Stock Market Tendency Using GA-Based Support Vector Machines. 336-345 - Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi
:
Model-Based Analysis of Money Accountability in Electronic Purses. 346-355 - Yukun Cao, Yunfeng Li, Xiaofeng Liao:
Applying Modified Fuzzy Neural Network to Customer Classification of E-Business. 356-365 - Qin Liao, Huimin Gu, Zhifeng Hao, Zhonghua Tang:
Fuzzy Comprehensive Evaluation of E-commerce and Process Improvement. 366-374 - Jichang Dong, Wuyi Yue:
Application of Integrated Web Services-Based E-business and Web Services-Based Business Process Monitoring. 375-384 - Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu:
A Note on the Cramer-Damgård Identification Scheme. 385-390 - Kaile Su
, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen:
Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System. 391-404 - Eun-Jun Yoon, Kee-Young Yoo:
Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. 405-413 - Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo:
New Authentication Protocol Providing User Anonymity in Open Network. 414-423 - Arindam Chakrabarti:
Effective Filtering for Collaborative Publishing. 424-433 - Kay-Yut Chen, Tad Hogg:
Experimental Evaluation of an eBay-Style Self-reporting Reputation Mechanism. 434-443 - Alfredo Milani
, Stefano Marcugini:
An Architecture for Evolutionary Adaptive Web Systems. 444-454 - Jun Wang, Yong-Hong Sun, Zhi-Ping Fan, Yan Liu:
A Collaborative E-learning System Based on Multi-agent. 455-463 - Wei-Guo Zhang, Wen An Liu, Ying-Luo Wang:
A Class of Possibilistic Portfolio Selection Models and Algorithms. 464-472 - Bernard Fong, Alvis Cheuk M. Fong, Guan Y. Hong
, Louisa Wong:
An Empirical Study of Volatility Predictions: Stock Market Analysis Using Neural Networks. 473-480 - Ping Li, Peng Shi, Guangdong Huang:
A New Algorithm Based on Copulas for Financial Risk Calculation with Applications to Chinese Stock Markets. 481-490 - Myung-hee Kang, Hwang-Bin Ryou, WoongChul Choi:
Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments. 491-499 - Robert W. Zhu, Guomin Yang
, Duncan S. Wong:
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. 500-509 - Hung Chim:
To Build a Blocklist Based on the Cost of Spam. 510-519 - Qizhi Fang, Hye Kyung Kim, Dae Sik Lee:
Total Dominating Set Games. 520-530 - Franco Salvetti, Savitha Srinivasan:
Local Flow Betweenness Centrality for Clustering Community Graphs. 531-544 - Yijun Liu, Xijin Tang:
Computerized Collaborative Support for Enhancing Human's Creativity for Networked Community. 545-553 - Yinfeng Xu, Chunlin Xin, Fanglei Yi:
New Results on Online Replacement Problem. 554-563 - Wun-Tat Chan, Francis Y. L. Chin, Deshi Ye, Guochuan Zhang
, Yong Zhang:
Online Bin Packing of Fragile Objects with Application in Cellular Networks. 564-573 - Maolin Hu, Yinfeng Xu, Weijun Xu:
Online Algorithms for the Vehicle Scheduling Problem with Time Objective. 574-583 - Anthony Man-Cho So
, Yinyu Ye:
On Solving Coverage Problems in a Wireless Sensor Network Using Voronoi Diagrams. 584-593 - Ming Yang, Renfeng Xiao:
A Computational Model of Mortgage Prepayment Options. 594-601 - Masashi Kiyomi
, Takeaki Uno, Tomomi Matsui
:
Efficient Algorithms for the Electric Power Transaction Problem. 602-611 - Zhongfei Li, Kai W. Ng:
Looking for Arbitrage or Term Structures in Frictional Markets. 612-621 - Zhi-Ping Fan, Yong Feng, Yong-Hong Sun, Bo Feng, Tian-Hui You:
A Framework on Compound Knowledge Push System Oriented to Organizational Employees. 622-630 - Satoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara
:
Effective Decision Making by Self-evaluation in the Multi-agent Environment. 631-640 - Chongying Cao, Jing Yang, Guoqing Zhang:
Overlay Based Mapping Egress Service Path Between MPLS Domains. 641-650 - Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, Wendong Wang:
An Adaptive Group-Based Reputation System in Peer-to-Peer Networks. 651-659 - Kanliang Wang, Yuan Wang, Jingtao Yao:
A Comparative Study on Marketing Mix Models for Digital Products. 660-669 - Xun Liang
, Yang Bo He:
Optimal Pricing for Web Search Engines. 670-679 - Li-jun Li, Xiao-yuan Huang, Li-ping Yu, Bo Xu:
Pricing Strategy of Mixed Traditional and Online Distribution Channels Based on Stackelberg Game. 680-687 - Mohamed Saad
, Tamás Terlaky
, Anthony Vannelli, Hu Zhang:
Packing Trees in Communication Networks. 688-697 - Eric Angel, Evripidis Bampis, Fanny Pascual:
Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines. 698-707 - Adrian Petcu, Boi Faltings:
Incentive Compatible Multiagent Constraint Optimization. 708-717 - Dinesh Garg, Yadati Narahari:
Design of Incentive Compatible Mechanisms for Stackelberg Problems. 718-727 - Ishai Menache, Nahum Shimkin:
Proportional QoS in Differentiated Services Networks: Capacity Management, Equilibrium Analysis and Elastic Demands. 728-737 - Gireesh Shrimali, Sunil Kumar:
Can "Bill-and-Keep" Peering Be Mutually Beneficial?. 738-747 - Yong-Hyuk Moon, Byungsang Kim, Chan-Hyun Youn:
Design of P2P Grid Networking Architecture Using k-Redundancy Scheme Based Group Peer Concept. 748-757 - Aihua Li
, Yong Shi:
An Integrated Classification Method: Combination of LP and LDA. 758-767 - Peng Du, Yanmei Li, Weixuan Xu:
Cooperation Evolution of Indirect Reciprocity by Discrimination. 768-776 - Zhi-Chun Li
, Hai-Jun Huang
:
Fixed-Point Model and Schedule Reliability of Morning Commuting in Stochastic and Time-Dependent Transport Networks. 777-787 - Kamal Jain, Mohammad Mahdian:
Computing Equilibria in a Fisher Market with Linear Single-Constraint Production Units. 788-792 - Lihua Chen, Qiwen Wang:
Majority Equilibrium of Distribution Centers Allocation in Supply Chain Management. 793-800 - MinSeok Jang, Weon-Goo Kim, Yon-sik Lee, Jongwook Woo:
Traversal Pattern Mining in Web Environment. 801-805 - Yun-Fang Juan, Chi-Chao Chang:
An Analysis of Search Engine Switching Behavior Using Click Streams. 806-815 - Lingling Zhang, Jun Li, Yong Shi:
Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive Organization. 816-825 - Juan K. Lin:
Traffic Models for Community-Based Ranking and Navigation. 826-835 - Byung-Cheol Kim, Jonathan K. Shapiro:
On the Efficacy of Detecting and Punishing Selfish Peers. 836-847 - JinHong Kim, Eunseok Lee
:
Semantic Web Recommender System Based Personalization Service for User XQuery Pattern. 848-857 - Andrea Giovannucci
, Juan A. Rodríguez-Aguilar
, Jesús Cerquides
:
Multi-unit Combinatorial Reverse Auctions with Transformability Relationships Among Goods. 858-867 - Sampath Kameshwaran, Lyès Benyoucef, Xiaolan Xie:
Winner Determination in Discount Auctions. 868-877 - Uriel Feige, Abraham Flaxman, Jason D. Hartline, Robert D. Kleinberg:
On the Competitive Ratio of the Random Sampling Auction. 878-886 - Xianjia Wang, Yalin Chen, Wenqi Zhu:
The Pricing Strategies for Agents in Real E-commerce. 887-894 - Qianqin Chen, Wei-Guo Zhang, Guoliang Kuang:
Why Do Information Gatekeepers Charge Zero Subscription Fees? 895-905 - Lei Cao, Minglu Li, Jian Cao:
Cost-Driven Web Service Selection Using Genetic Algorithm. 906-915 - Yufeng Wang, Wendong Wang:
On Modeling Internet QoS Provisioning from Economic Models. 916-925 - Taehan Kim, Sang-Chan Park:
Metadata and Information Asset for Infomediary Business Model on Primary Product Market. 926-935 - Xinli Huang, Fanyuan Ma, Wenju Zhang, Yin Li:
On Protection of Threatened Unstructured Overlays: An Economic Defense Model and Its Applications. 936-946 - Wen Ding, William Yurcik, Xiaoxin Yin:
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. 947-958 - Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang:
Secure Construction of Virtual Organizations in Grid Computing Systems. 959-968 - Marios Mavronicolas
, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis:
A Graph-Theoretic Network Security Game. 969-978 - Weizhao Wang, Xiang-Yang Li, Xiaowen Chu
:
Nash Equilibria and Dominant Strategies in Routing. 979-988 - Spyros C. Kontogiannis
, Paul G. Spirakis:
Atomic Selfish Routing in Networks: A Survey. 989-1002 - Louis Lei Yu, Eric G. Manning, Kin F. Li:
Heuristic Approaches to Service Level Agreements in Packet Networks. 1003-1012 - Li-Sha Huang:
A Fixed Point Approach for the Computation of Market Equilibria. 1013-1022 - Vincenzo Bonifaci
, Ugo Di Iorio, Luigi Laura
:
New Results on the Complexity of Uniformly Mixed Nash Equilibria. 1023-1032 - George F. Georgakopoulos, Dimitris J. Kavvadias, Leonidas G. Sioutis:
Nash Equilibria in All-Optical Networks. 1033-1045 - Nikhil R. Devanur, Naveen Garg
, Rohit Khandekar, Vinayaka Pandit, Amin Saberi, Vijay V. Vazirani:
Price of Anarchy, Locality Gap, and a Network Service Provider Game. 1046-1055 - HyoJoo Park, TaeYong Kim, SaJoong Kim:
Network Traffic Analysis and Modeling for Games. 1056-1065 - Dinesh Garg, Yadati Narahari:
Price of Anarchy of Network Routing Games with Incomplete Information. 1066-1075 - Hui Huang, Shunming Zhang:
General Equilibrium for Economies with Harmful Overconsumption. 1076-1086 - Jaroslav Zajac:
Expectations, Asymmetries, and Contributions. 1087-1093 - Xiaodao Wu, Yanfeng Sun, Yanchun Liang:
A Quantile-Data Mapping Model for Value-at-Risk Based on BP and Support Vector Regression. 1094-1102
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.