rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540309000

Internet and Network Economics : First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005: Proceedings

by ;
  • ISBN13:

    9783540309000

  • ISBN10:

    3540309004

  • Format: Paperback
  • Copyright: 2006-02-15
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $219.00 Save up to $161.76
  • Digital
    $124.02*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the refereed proceedings of the First International Workshop on Internet and Network Economics, WINE 2005, held in Hong Kong, China in December 2005. The 108 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 372 submissions. There are 31 papers in the main program and 77 papers presented in 16 special tracks covering the areas of internet and algorithmic economics, e-commerce protocols, security, collaboration, reputation and social networks, algorithmic mechanism, financial computing, auction algorithms, online algorithms, collective rationality, pricing policies, web mining strategies, network economics, coalition strategies, internet protocols, price sequence, and equilibrium.

Table of Contents

Recent Developments in Equilibria Algorithms (Invited Talk I)
Christos Papadimitriou
1(2)
Partially-Specified Large Games (Invited Talk II)
Ehud Kalai
3(11)
Exchange Market Equilibria with Leontief's Utility: Freedom of Pricing Leads to Rationality
Yinyu Ye
14(10)
A Primal-Dual Algorithm for Computing Fisher Equilibrium in the Absence of Gross Substitutability Property
Dinesh Garg, Kamal Jain, Kunal Talwar, Vijay V. Vazirani
24(10)
Click Fraud Resistant Methods for Learning Click-Through Rates
Nicole Immorlica, Kamal Jain, Mohammad Mandian, Kunal Talwar
34(12)
Experiments with an Economic Model of the Worldwide Web
Georgios Kouroupas, Elias Koutsoupias, Christos H. Papadimitriou, Martha Sideri
46(9)
Coordination Mechanisms for Selfish Scheduling
Nicole Immorlica, Li Li, Vahab S. Mirrokni, Andreas Schulz
55(15)
Economic Mechanisms for Shortest Path Cooperative Games with Incomplete Information
T.S. Chandrashekar, Yadati Narahari
70(10)
Truth-Telling Reservations
Fang Wu, Li Zhang, Bernardo A. Huberman
80(12)
Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions
Subhash Khot, Richard J. Lipton, Evangelos Markakis, Aranyak Mehta
92(10)
An Auction-Based Market Equilibrium Algorithm for a Production Model
Sanjiv Kapoor, Aranyak Mehta, Vijay Vazirani
102(10)
New Algorithms for Mining the Reputation of Participants of Online Auctions
Mikolaj Morzy
112(10)
A Simple Characterization for Truth-Revealing Single-Item Auctions
Kamal Jain, Aranyak Mehta, Kunal Talwar, Vijay Vazirani
122(7)
Prediction Games
Amir Ronen, Lyron Wahrmann
129(12)
Walrasian Equilibrium: Hardness, Approximations and Tractable Instances
Ning Chen, Atri Rudra
141(10)
On the Structure and Complexity of Worst-Case Equilibria
Simon Fischer, Berthold Vöcking
151(10)
Club Formation by Rational Sharing: Content, Viability and Community Structure
W.-Y. Ng, D.M. Chiu, W.K. Lin
161(13)
Subjective-Cost Policy Routing
Joan Feigenbaum, David R. Karger, Vahab S. Mirrokni, Rahul Sami
174(10)
Economic Analysis of Networking Technologies for Rural Developing Regions
Shridhar Mubaraq Mishra, John Hwang, Dick Filippini, Reza Moazzami, Lakshminarayanan Subramanian, Tom Du
184(11)
A Simple Graph-Theoretic Model for Selfish Restricted Scheduling
Robert Elsässer, Martin Gairing, Thomas Lücking, Marios Mavronicolas, Burkhard Monien
195(15)
A Cost Mechanism for Fair Pricing of Resource Usage
Marios Mavronicolas, Panagiota N. Panagopoulou, Paul G. Spirakis
210(15)
A Delay Pricing Scheme for Real-Time Delivery in Deadline-Based Networks
Yanni Ellen Liu, Xiao Huan Liu
225(11)
Game-Theoretic Analysis of Internet Switching with Selfish Users
Alex Kesselman, Stefano Leonardi, Vincenzo Bonifaci
236(10)
The Price of Anarchy of Cournot Oligopoly
Xiaolei Guo, Hai Yang
246(12)
Incentives in Some Coalition Formation Games
Gabrielle Demange
258(10)
Enforcing Truthful Strategies in Incentive Compatible Reputation Mechanisms
Radu Jurca, Boi Faltings
268(10)
Strategy/False-Name Proof Protocols for Combinatorial Multi-attribute Procurement Auction: Handling Arbitrary Utility of the Buyer
Takayuki Suyama, Makoto Yokoo
278(10)
Practical Zero-Knowledge Arguments from Σ protocols
Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao
288(11)
Bayesian Communication Leading to a Nash Equilibrium in Belief
Takashi Matsuhisa, Paul Strokan
299(8)
The Bahncard Problem with Interest Rate and Risk
Lili Ding, Yinfeng Xu, Shuhua Hu
307(8)
Optimal Starting Price in Online Auctions
Hai Yu, Shouyang Wang, Chuangyin Dang
315(10)
Time Interval-Based Prepaid Charging of QoS-Enabled IP Services
Pascal Kurtansky, Burkhard Stiller
325(11)
Mining Stock Market Tendency Using GA-Based Support Vector Machines
Lean Yu, Shouyang Wang, Kin Keung Lai
336(10)
Model-Based Analysis of Money Accountability in Electronic Purses
Il-Gon Kim, Young-Joo Moon, Inhye Kang, Ji-Yeon Lee, Keun-Hee Han, Jin-Young Choi
346(10)
Applying Modified Fuzzy Neural Network to Customer Classification of E-Business
Yukun Cao, Yinfeng Li, Xiaofeng Liao
356(10)
Fuzzy Comprehensive Evaluation of E-Commerce and Process Improvement
Qin Liao, Huimin Gu, Zhifeng Hao, Zhonghua Tang
366(9)
Application of Integrated Web Services-Based E-Business and Web Services-Based Business Process Monitoring
Jichang Dong, Wuyi Yue
375(10)
A Note on the Cramer-Damgård Identification Scheme
Yunlei Zhao, Shirley H.C. Cheung, Binyu Zang, Bin Zhu
385(6)
Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System
Kaile Su, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen
391(14)
Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards
Eun-Jun Yoon, Kee-Young Yoo
405(9)
New Authentication Protocol Providing User Anonymity in Open Network
Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo
414(10)
Effective Filtering for Collaborative Publishing
Arindam Chakrabarti
424(10)
Experimental Evaluation of an eBay-Style Self-reporting Reputation Mechanism
Kay-Yut Chen, Tad Hogg
434(10)
An Architecture for Evolutionary Adaptive Web Systems
Alfredo Milani, Stefano Marcugini
444(11)
A Collaborative E-learning System Based on Multi-agent
Jun Wang, Yong-Hong Sun, Zhi-Ping Fan, Yan Liu
455(9)
A Class of Possibilistic Portfolio Selection Models and Algorithms
Wei-Guo Zhang, Wen-An Liu, Ying-Luo Wang
464(9)
An Empirical Study of Volatility Predictions: Stock Market Analysis Using Neural Networks
Bernard Fong, A.C.M. Fong, G.Y. Hong, Louisa Wong
473(8)
A New Algorithm Based on Copulas for Financial Risk Calculation with Applications to Chinese Stock Markets
Ping Li, Peng Shi, Guang-Dong Huang
481(10)
Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments
Myung-hee Kang, Hwang-bin Ryou, WoongChul Choi
491(9)
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices
Robert W. Zhu, Guomin Yang, Duncan S. Wong
500(10)
To Build a Blocklist Based on the Cost of Spam
Hung Chim
510(10)
Total Dominating Set Games
Qizhi Fang, Hye Kyung Kim, Dae Sik Lee
520(11)
Local Flow Betweenness Centrality for Clustering Community Graphs
Franco Salvetti, Savitha Srinivasan
531(14)
Computerized Collaborative Support for Enhancing Human's Creativity for Networked Community
Yijun Liu, Xijin Tang
545(9)
New Results on Online Replacement Problem
Yinfeng Xu, Chunlin Xin, Fanglei Yi
554(10)
Online Bin Packing of Fragile Objects with Application in Cellular Networks
Wun-Tat Chan, Francis Y.L. Chin, Deshi Ye, Guochuan Zhang, Yong Zhang
564(10)
Online Algorithms for the Vehicle Scheduling Problem with Time Objective
Maolin Hu, Yinfeng Xu, Weijun Xu
574(10)
On Solving Coverage Problems in a Wireless Sensor Network Using Voronoi Diagrams
Anthony Man-Cho So, Yinyu Ye
584(10)
A Computational Model of Mortgage Prepayment Options
Ming Yang, Renfeng Xiao
594(8)
Efficient Algorithms for the Electric Power Transaction Problem
Masashi Kiyomi, Takeaki Uno, Tomomi Matsui
602(10)
Looking for Arbitrage or Term Structures in Frictional Markets
Zhongfei Li, Kai W. Ng
612(10)
A Framework on Compound Knowledge Push System Oriented to Organizational Employees
Zhi-Ping Fan, Yong Feng, Yong-Hong Sun, Bo Feng, Tian-Hui You
622(9)
Effective Decision Making by Self-evaluation in the Multi-agent Environment
Satoshi Kurihara, Kensuke Fukuda, Shihya Sato, Toshiharu Sugawara
631(10)
Overlay Based Mapping Egress Service Path Between MPLS Domains
Chongying Cao, Jing Yang, Guoqing Zhang
641(10)
An Adaptive Group-Based Reputation System in Peer-to-Peer Networks
Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, Wendong Wang
651(9)
A Comparative Study on Marketing Mix Models for Digital Products
KanLiang Wang, Yuan Wang, JingTao Yao
660(10)
Optimal Pricing for Web Search Engines
Xun Liang, Yang-Bo He
670(10)
Pricing Strategy of Mixed Traditional and Online Distribution Channels Based on Stackelberg Game
Li-jun Li, Xiao-yuan Huang, Li-ping Yu, Bo Xu
680(8)
Packing Trees in Communication Networks
Mohamed Saad, Tamás Terlaky, Anthony Vannelli, Hu Zhang
688(10)
Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines
Eric Angel, Evripidis Bampis, Fanny Pascual
698(10)
Incentive Compatible Multiagent Constraint Optimization
Adrian Petcu, Boi Faltings
708(10)
Design of Incentive Compatible Mechanisms for Stackelberg Problems
Dinesh Garg, Yadati Narahari
718(10)
Proportional QoS in Differentiated Services Networks: Capacity Management, Equilibrium Analysis and Elastic Demands
Ishai Menache, Nahum Shimkin
728(10)
Can "Bill-and-Keep" Peering Be Mutually Beneficial?
Gireesh Shrimali, Sunil Kumar
738(10)
Design of P2P Grid Networking Architecture Using k-Redundancy Scheme Based Group Peer Concept
Yong-Hyuk Moon, Byung-Sang Kim, Chan-Hyun Youn
748(10)
An Integrated Classification Method: Combination of LP and LDA
Aihua Li, Yong Shi
758(10)
Cooperation Evolution of Indirect Reciprocity by Discrimination
Peng Du, Yanmei Li, Weixuan Xu
768(9)
Fixed-Point Model and Schedule Reliability of Morning Commuting in Stochastic and Time-Dependent Transport Networks
Zhi-Chun Li, Hai-Jun Huang
777(11)
Computing Equilibria in a Fisher Market with Linear Single-Constraint Production Units
Kamal Jain, Mohammad Mahdian
788(5)
Majority Equilibrium of Distribution Centers Allocation in Supply Chain Management
Lihua Chen, Qiwen Wang
793(8)
Traversal Pattern Mining in Web Environment
MinSeok Jang, Weon-Goo Kim, Yon-sik Lee, Jongwook Woo
801(5)
An Analysis of Search Engine Switching Behavior Using Click Streams
Yun-Fang Juan, Chi-Chao Chang
806(10)
Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive Organization
Lingling Zhang, Jun Li, Yong Shi
816(10)
Traffic Models for Community-Based Ranking and Navigation
Juan K. Lin
826(10)
On the Efficacy of Detecting and Punishing Selfish Peers
Byung-Cheol Kim, Jonathan K. Shapiro
836(12)
Semantic Web Recommender System Based Personalization Service for User XQuery Pattern
JinHong Kim, EunSeok Lee
848(10)
Multi-unit Combinatorial Reverse Auctions with Transformability Relationships Among Goods
Andrea Giovannucci, Juan A. Rodriguez-Aguilar, Jesús Cerquides
858(10)
Winner Determination in Discount Auctions
Sampath Kameshwaran, L. Benyoucef, X. Xie
868(10)
On the Competitive Ratio of the Random Sampling Auction
Uriel Feige, Abraham, Flaxman, Jason D. Hartline, Robert Kleinberg
878(9)
The Pricing Strategies for Agents in Real E-Commerce
Wang Xianjia, Chen Yalin, Zhu Wenqi
887(8)
Why Do Information Gatekeepers Charge Zero Subscription Fees?
Qianqin Chen, Wei-Guo Zhang, Guoliang Kuang
895(11)
Cost-Driven Web Service Selection Using Genetic Algorithm
Lei Cao, Minglu Li, Jian Cao
906(10)
On Modeling Internet QoS Provisioning from Economic Models
Yufeng Wang, Wendong Wang
916(10)
Metadata and Information Asset for Infomediary Business Model on Primary Product Market
Taehan Kim, Sang Chan Park
926(10)
On Protection of Threatened Unstructured Overlays: An Economic Defense Model and Its Applications
Xinli Huang, Fanyuan Ma, Wenju Zhang, Yin Li
936(11)
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers
Wen Ding, William Yurcik, Xiaoxin Yin
947(12)
Secure Construction of Virtual Organizations in Grid Computing Systems
Bangyu Wu, Kwok-Yan Lam, Siu-Leung Chung, Huaxiong Wang
959(10)
A Graph-Theoretic Network Security Game
Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul Spirakis
969(10)
Nash Equilibria and Dominant Strategies in Routing
Weizhao Wang, Xiang-Yang Li, Xiaowen Chu
979(10)
Atomic Selfish Routing in Networks: A Survey
Spyros Kontogiannis, Paul Spirakis
989(14)
Heuristic Approaches to Service Level Agreements in Packet Networks
Louis L. Yu, Eric G. Manning, Kin F. Li
1003(10)
A Fixed Point Approach for the Computation of Market Equilibria
Li-Sha Huang
1013(10)
New Results on the Complexity of Uniformly Mixed Nash Equilibria
Vincenzo Bonifaci, Ugo Di Iorio, Luigi Laura
1023(10)
Nash Equilibria in All-Optical Networks
George F. Georgakopoulos, Dimitris J. Kavvadias, Leonidas G. Sioutis
1033(13)
Price of Anarchy, Locality Gap, and a Network Service Provider Game
Nikhil Devanur, Naveen Garg, Rohit Khandekar, Vinayaka Pandit, Amin Saberi, Vijay Vazirani
1046(10)
Network Traffic Analysis and Modeling for Games
HyoJoo Park, TaeYong Kim, SaJoong Kim
1056(10)
Price of Anarchy of Network Routing Games with Incomplete Information
Dinesh Garg, Yadati Narahari
1066(10)
General Equilibrium for Economies with Harmful Overconsumption
Hui Huang, Shunming Zhang
1076(11)
Expectations, Asymmetries, and Contributions
Jaroslav Zajac
1087(7)
A Quantile-Data Mapping Model for Value-at-Risk Based on BP and Support Vector Regression
Xiaodao Wu, Yanfeng Sun, Yanchun Liang
1094(9)
Author Index 1103

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program