Making greed work in networks: a game-theoretic analysis of switch service disciplines
IEEE/ACM Transactions on Networking (TON)
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Journal of the ACM (JACM)
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
A BGP-based mechanism for lowest-cost routing
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Selfish behavior and stability of the internet:: a game-theoretic analysis of TCP
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Tussle in cyberspace: defining tomorrow's internet
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Proceedings of the 11th annual international conference on Mobile computing and networking
Selfish Grids: Game-Theoretic Modeling and NAS/PSA Benchmark Evaluation
IEEE Transactions on Parallel and Distributed Systems
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
On the Design Dilemma in Dining Cryptographer Networks
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Technical challenges in market-driven automated service provisioning
Proceedings of the 3rd workshop on Middleware for service oriented computing
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part I on On the Move to Meaningful Internet Systems:
Reconciling community resource requirements in U-Nets
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities
ASGrid: autonomic management of hybrid sensor grid systems and applications
International Journal of Sensor Networks
Cooperative power-aware scheduling in grid computing environments
Journal of Parallel and Distributed Computing
Enforcing honesty in assured information sharing within a distributed system
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
PolyViNE: policy-based virtual network embedding across multiple domains
Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
QoS-T: QoS throttling to elicit user cooperation in computer systems
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Design space analysis for modeling incentives in distributed systems
Proceedings of the ACM SIGCOMM 2011 conference
Distributed self-policing architecture for fostering node cooperation in wireless mesh networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Towards modeling trust based decisions: a game theoretic approach
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
We applied techniques from game theory to help formulate and analyze solutions to two systems problems: discouraging selfishness in multi-hop wireless networks and enabling cooperation among ISPs in the Internet. It proved difficult to do so. This paper reports on our experiences and explains the issues that we encountered. It describes the ways in which the straightforward use of results from traditional game theory did not fit well with the requirements of our problems. It also identifies an important characteristic of the solutions we did eventually adopt that distinguishes them from those available using game theoretic approaches. We hope that this discussion will help to highlight formulations of game theory which are well-suited for problems involving computer systems.