Abstract is missing.
- Recent Developments in Equilibria AlgorithmsChristos H. Papadimitriou. 1-2 [doi]
- Partially-Specified Large GamesEhud Kalai. 3-13 [doi]
- Exchange Market Equilibria with Leontief s Utility: Freedom of Pricing Leads to RationalityYinyu Ye. 14-23 [doi]
- A Primal-Dual Algorithm for Computing Fisher Equilibrium in the Absence of Gross Substitutability PropertyDinesh Garg, Kamal Jain, Kunal Talwar, Vijay V. Vazirani. 24-33 [doi]
- Click Fraud Resistant Methods for Learning Click-Through RatesNicole Immorlica, Kamal Jain, Mohammad Mahdian, Kunal Talwar. 34-45 [doi]
- Experiments with an Economic Model of the Worldwide WebGeorgios Kouroupas, Elias Koutsoupias, Christos H. Papadimitriou, Martha Sideri. 46-54 [doi]
- Coordination Mechanisms for Selfish SchedulingNicole Immorlica, Li Li, Vahab S. Mirrokni, Andreas S. Schulz. 55-69 [doi]
- Economic Mechanisms for Shortest Path Cooperative Games with Incomplete InformationT. S. Chandrashekar, Yadati Narahari. 70-79 [doi]
- Truth-Telling ReservationsFang Wu, Li Zhang, Bernardo A. Huberman. 80-91 [doi]
- Inapproximability Results for Combinatorial Auctions with Submodular Utility FunctionsSubhash Khot, Richard J. Lipton, Evangelos Markakis, Aranyak Mehta. 92-101 [doi]
- An Auction-Based Market Equilibrium Algorithm for a Production ModelSanjiv Kapoor, Aranyak Mehta, Vijay V. Vazirani. 102-111 [doi]
- New Algorithms for Mining the Reputation of Participants of Online AuctionsMikolaj Morzy. 112-121 [doi]
- A Simple Characterization for Truth-Revealing Single-Item AuctionsKamal Jain, Aranyak Mehta, Kunal Talwar, Vijay V. Vazirani. 122-128 [doi]
- Prediction GamesAmir Ronen, Lyron Wahrmann. 129-140 [doi]
- Walrasian Equilibrium: Hardness, Approximations and Tractable InstancesNing Chen, Atri Rudra. 141-150 [doi]
- On the Structure and Complexity of Worst-Case EquilibriaSimon Fischer, Berthold Vöcking. 151-160 [doi]
- Club Formation by Rational Sharing: Content, Viability and Community StructureW.-Y. Ng, D. M. Chiu, W. K. Lin. 161-173 [doi]
- Subjective-Cost Policy RoutingJoan Feigenbaum, David R. Karger, Vahab S. Mirrokni, Rahul Sami. 174-183 [doi]
- Economic Analysis of Networking Technologies for Rural Developing RegionsShridhar Mubaraq Mishra, John Hwang, Dick Filippini, Reza Moazzami, Lakshminarayanan Subramanian, Tom Du. 184-194 [doi]
- A Simple Graph-Theoretic Model for Selfish Restricted SchedulingRobert Elsässer, Martin Gairing, Thomas Lücking, Marios Mavronicolas, Burkhard Monien. 195-209 [doi]
- A Cost Mechanism for Fair Pricing of Resource UsageMarios Mavronicolas, Panagiota N. Panagopoulou, Paul G. Spirakis. 210-224 [doi]
- A Delay Pricing Scheme for Real-Time Delivery in Deadline-Based NetworksYanni Ellen Liu, Xiao Huan Liu. 225-235 [doi]
- Game-Theoretic Analysis of Internet Switching with Selfish UsersAlexander Kesselman, Stefano Leonardi, Vincenzo Bonifaci. 236-245 [doi]
- The Price of Anarchy of Cournot OligopolyXiaolei Guo, Hai Yang. 246-257 [doi]
- Incentives in Some Coalition Formation GamesGabrielle Demange. 258-267 [doi]
- Enforcing Truthful Strategies in Incentive Compatible Reputation MechanismsRadu Jurca, Boi Faltings. 268-277 [doi]
- Strategy/False-Name Proof Protocols for Combinatorial Multi-attribute Procurement Auction: Handling Arbitrary Utility of the BuyerTakayuki Suyama, Makoto Yokoo. 278-287 [doi]
- Practical Zero-Knowledge Arguments from Sigma-ProtocolsYunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao. 288-298 [doi]
- Bayesian Communication Leading to a Nash Equilibrium in BeliefTakashi Matsuhisa, Paul Strokan. 299-306 [doi]
- The Bahncard Problem with Interest Rate and RiskLili Ding, Yinfeng Xu, Shuhua Hu. 307-314 [doi]
- Optimal Starting Price in Online AuctionsHai Yu, Shouyang Wang, Chuangyin Dang. 315-324 [doi]
- Time Interval-Based Prepaid Charging of QoS-Enabled IP ServicesPascal Kurtansky, Burkhard Stiller. 325-335 [doi]
- Mining Stock Market Tendency Using GA-Based Support Vector MachinesLean Yu, Shouyang Wang, Kin Keung Lai. 336-345 [doi]
- Model-Based Analysis of Money Accountability in Electronic PursesIl-Gon Kim, Young-Joo Moon, Inhye Kang, Ji Yeon Lee, Keun-Hee Han, Jin-Young Choi. 346-355 [doi]
- Applying Modified Fuzzy Neural Network to Customer Classification of E-BusinessYukun Cao, Yunfeng Li, Xiaofeng Liao. 356-365 [doi]
- Fuzzy Comprehensive Evaluation of E-commerce and Process ImprovementQin Liao, Huimin Gu, Zhifeng Hao, Zhonghua Tang. 366-374 [doi]
- Application of Integrated Web Services-Based E-business and Web Services-Based Business Process MonitoringJichang Dong, Wuyi Yue. 375-384 [doi]
- A Note on the Cramer-Damgård Identification SchemeYunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin Zhu. 385-390 [doi]
- Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant SystemKaile Su, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen. 391-404 [doi]
- Secure Fingerprint-Based Remote User Authentication Scheme Using SmartcardsEun-Jun Yoon, Kee-Young Yoo. 405-413 [doi]
- New Authentication Protocol Providing User Anonymity in Open NetworkWoo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo. 414-423 [doi]
- Effective Filtering for Collaborative PublishingArindam Chakrabarti. 424-433 [doi]
- Experimental Evaluation of an eBay-Style Self-reporting Reputation MechanismKay-Yut Chen, Tad Hogg. 434-443 [doi]
- An Architecture for Evolutionary Adaptive Web SystemsAlfredo Milani, Stefano Marcugini. 444-454 [doi]
- A Collaborative E-learning System Based on Multi-agentJun Wang, Yong-Hong Sun, Zhi-Ping Fan, Yan Liu. 455-463 [doi]
- A Class of Possibilistic Portfolio Selection Models and AlgorithmsWei-Guo Zhang, Wen An Liu, Ying-Luo Wang. 464-472 [doi]
- An Empirical Study of Volatility Predictions: Stock Market Analysis Using Neural NetworksBernard Fong, Alvis Cheuk M. Fong, G. Y. Hong, Louisa Wong. 473-480 [doi]
- A New Algorithm Based on Copulas for Financial Risk Calculation with Applications to Chinese Stock MarketsPing Li, Peng Shi, Guang-Dong Huang. 481-490 [doi]
- Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing EnvironmentsMyung-hee Kang, Hwang-bin Ryou, WoongChul Choi. 491-499 [doi]
- An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power DevicesRobert W. Zhu, Guomin Yang, Duncan S. Wong. 500-509 [doi]
- To Build a Blocklist Based on the Cost of SpamHung Chim. 510-519 [doi]
- Total Dominating Set GamesQizhi Fang, Hye Kyung Kim, Dae Sik Lee. 520-530 [doi]
- Local Flow Betweenness Centrality for Clustering Community GraphsFranco Salvetti, Savitha Srinivasan. 531-544 [doi]
- Computerized Collaborative Support for Enhancing Human s Creativity for Networked CommunityYijun Liu, Xijin Tang. 545-553 [doi]
- New Results on Online Replacement ProblemYinfeng Xu, Chunlin Xin, Fanglei Yi. 554-563 [doi]
- Online Bin Packing of Fragile Objects with Application in Cellular NetworksWun-Tat Chan, Francis Y. L. Chin, Deshi Ye, Guochuan Zhang, Yong Zhang. 564-573 [doi]
- Online Algorithms for the Vehicle Scheduling Problem with Time ObjectiveMaolin Hu, Yinfeng Xu, Weijun Xu. 574-583 [doi]
- On Solving Coverage Problems in a Wireless Sensor Network Using Voronoi DiagramsAnthony Man-Cho So, Yinyu Ye. 584-593 [doi]
- A Computational Model of Mortgage Prepayment OptionsMing Yang, Renfeng Xiao. 594-601 [doi]
- Efficient Algorithms for the Electric Power Transaction ProblemMasashi Kiyomi, Takeaki Uno, Tomomi Matsui. 602-611 [doi]
- Looking for Arbitrage or Term Structures in Frictional MarketsZhongfei Li, Kai W. Ng. 612-621 [doi]
- A Framework on Compound Knowledge Push System Oriented to Organizational EmployeesZhi-Ping Fan, Yong Feng, Yong-Hong Sun, Bo Feng, Tian-hui You. 622-630 [doi]
- Effective Decision Making by Self-evaluation in the Multi-agent EnvironmentSatoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara. 631-640 [doi]
- Overlay Based Mapping Egress Service Path Between MPLS DomainsChongying Cao, Jing Yang, Guoqing Zhang. 641-650 [doi]
- An Adaptive Group-Based Reputation System in Peer-to-Peer NetworksLiang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, Wendong Wang. 651-659 [doi]
- A Comparative Study on Marketing Mix Models for Digital ProductsKanliang Wang, Yuan Wang, Jingtao Yao. 660-669 [doi]
- Optimal Pricing for Web Search EnginesXun Liang, Yang Bo He. 670-679 [doi]
- Pricing Strategy of Mixed Traditional and Online Distribution Channels Based on Stackelberg GameLi-jun Li, Xiao-yuan Huang, Li-ping Yu, Bo Xu. 680-687 [doi]
- Packing Trees in Communication NetworksMohamed Saad, Tamás Terlaky, Anthony Vannelli, Hu Zhang. 688-697 [doi]
- Truthful Algorithms for Scheduling Selfish Tasks on Parallel MachinesEric Angel, Evripidis Bampis, Fanny Pascual. 698-707 [doi]
- Incentive Compatible Multiagent Constraint OptimizationAdrian Petcu, Boi Faltings. 708-717 [doi]
- Design of Incentive Compatible Mechanisms for Stackelberg ProblemsDinesh Garg, Yadati Narahari. 718-727 [doi]
- Proportional QoS in Differentiated Services Networks: Capacity Management, Equilibrium Analysis and Elastic DemandsIshai Menache, Nahum Shimkin. 728-737 [doi]
- Can Bill-and-Keep Peering Be Mutually Beneficial?Gireesh Shrimali, Sunil Kumar. 738-747 [doi]
- Design of P2P Grid Networking Architecture Using ::::k::::-Redundancy Scheme Based Group Peer ConceptYong-Hyuk Moon, Byungsang Kim, Chan-Hyun Youn. 748-757 [doi]
- An Integrated Classification Method: Combination of LP and LDAAihua Li, Yong Shi. 758-767 [doi]
- Cooperation Evolution of Indirect Reciprocity by DiscriminationPeng Du, Yanmei Li, Weixuan Xu. 768-776 [doi]
- Fixed-Point Model and Schedule Reliability of Morning Commuting in Stochastic and Time-Dependent Transport NetworksZhi-Chun Li, Hai-Jun Huang. 777-787 [doi]
- Computing Equilibria in a Fisher Market with Linear Single-Constraint Production UnitsKamal Jain, Mohammad Mahdian. 788-792 [doi]
- Majority Equilibrium of Distribution Centers Allocation in Supply Chain ManagementLihua Chen, Qiwen Wang. 793-800 [doi]
- Traversal Pattern Mining in Web EnvironmentMinSeok Jang, Weon-Goo Kim, Yon-sik Lee, Jongwook Woo. 801-805 [doi]
- An Analysis of Search Engine Switching Behavior Using Click StreamsYun-Fang Juan, Chi-Chao Chang. 806-815 [doi]
- Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive OrganizationLingling Zhang, Jun Li, Yong Shi. 816-825 [doi]
- Traffic Models for Community-Based Ranking and NavigationJuan K. Lin. 826-835 [doi]
- On the Efficacy of Detecting and Punishing Selfish PeersByung-Cheol Kim, Jonathan K. Shapiro. 836-847 [doi]
- Semantic Web Recommender System Based Personalization Service for User XQuery PatternJinHong Kim, Eunseok Lee. 848-857 [doi]
- Multi-unit Combinatorial Reverse Auctions with Transformability Relationships Among GoodsAndrea Giovannucci, Juan A. Rodríguez-Aguilar, Jesús Cerquides. 858-867 [doi]
- Winner Determination in Discount AuctionsSampath Kameshwaran, Lyès Benyoucef, Xiaolan Xie. 868-877 [doi]
- On the Competitive Ratio of the Random Sampling AuctionUriel Feige, Abraham Flaxman, Jason D. Hartline, Robert D. Kleinberg. 878-886 [doi]
- The Pricing Strategies for Agents in Real E-commerceXianjia Wang, Yalin Chen, Wenqi Zhu. 887-894 [doi]
- Why Do Information Gatekeepers Charge Zero Subscription Fees?Qianqin Chen, Wei-Guo Zhang, Guoliang Kuang. 895-905 [doi]
- Cost-Driven Web Service Selection Using Genetic AlgorithmLei Cao, Minglu Li, Jian Cao. 906-915 [doi]
- On Modeling Internet QoS Provisioning from Economic ModelsYufeng Wang, Wendong Wang. 916-925 [doi]
- Metadata and Information Asset for Infomediary Business Model on Primary Product MarketTaehan Kim, Sang-Chan Park. 926-935 [doi]
- On Protection of Threatened Unstructured Overlays: An Economic Defense Model and Its ApplicationsXinli Huang, Fanyuan Ma, Wenju Zhang, Yin Li. 936-946 [doi]
- Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service ProvidersWen Ding, William Yurcik, Xiaoxin Yin. 947-958 [doi]
- Secure Construction of Virtual Organizations in Grid Computing SystemsBangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang. 959-968 [doi]
- A Graph-Theoretic Network Security GameMarios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis. 969-978 [doi]
- Nash Equilibria and Dominant Strategies in RoutingWeizhao Wang, Xiang-Yang Li, Xiaowen Chu. 979-988 [doi]
- Atomic Selfish Routing in Networks: A SurveySpyros C. Kontogiannis, Paul G. Spirakis. 989-1002 [doi]
- Heuristic Approaches to Service Level Agreements in Packet NetworksLouis L. Yu, Eric G. Manning, Kin F. Li. 1003-1012 [doi]
- A Fixed Point Approach for the Computation of Market EquilibriaLi-Sha Huang. 1013-1022 [doi]
- New Results on the Complexity of Uniformly Mixed Nash EquilibriaVincenzo Bonifaci, Ugo Di Iorio, Luigi Laura. 1023-1032 [doi]
- Nash Equilibria in All-Optical NetworksGeorge F. Georgakopoulos, Dimitris J. Kavvadias, Leonidas G. Sioutis. 1033-1045 [doi]
- Price of Anarchy, Locality Gap, and a Network Service Provider GameNikhil R. Devanur, Naveen Garg, Rohit Khandekar, Vinayaka Pandit, Amin Saberi, Vijay V. Vazirani. 1046-1055 [doi]
- Network Traffic Analysis and Modeling for GamesHyoJoo Park, Taeyong Kim, Sajoong Kim. 1056-1065 [doi]
- Price of Anarchy of Network Routing Games with Incomplete InformationDinesh Garg, Yadati Narahari. 1066-1075 [doi]
- General Equilibrium for Economies with Harmful OverconsumptionHui Huang, Shunming Zhang. 1076-1086 [doi]
- Expectations, Asymmetries, and ContributionsJaroslav Zajac. 1087-1093 [doi]
- A Quantile-Data Mapping Model for Value-at-Risk Based on BP and Support Vector RegressionXiaodao Wu, Yanfeng Sun, Yanchun Liang. 1094-1102 [doi]