There is a veritable menagerie of auctions—single-dimensional, multi-dimensional, single- sided, double-sided, first-price, second-price, English, Dutch, Japanese, sealed-bid—and …
F McSherry, K Talwar - 48th Annual IEEE Symposium on …, 2007 - ieeexplore.ieee.org
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents …
Cognitive Radio Communications and Networks gives comprehensive and balanced coverage of the principles of cognitive radio communications, cognitive networks, and …
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
D Lehmann, LI Oćallaghan, Y Shoham - Journal of the ACM (JACM), 2002 - dl.acm.org
Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for …
Y Singer - 2010 IEEE 51st Annual Symposium on foundations …, 2010 - ieeexplore.ieee.org
We study a novel class of mechanism design problems in which the outcomes are constrained by the payments. This basic class of mechanism design problems captures …
Federated learning is a promising distributed machine learning paradigm that has been playing a significant role in providing privacy-preserving learning solutions. However …
K Zhu, E Hossain - IEEE Transactions on Mobile Computing, 2015 - ieeexplore.ieee.org
Virtualization has been seen as one of the main evolution trends in the forthcoming fifth generation (5G) cellular networks which enables the decoupling of infrastructure from the …
Y Liu, MJ Lee, Y Zheng - IEEE Transactions on mobile …, 2015 - ieeexplore.ieee.org
Mobile cloud computing utilizing cloudlet is an emerging technology to improve the quality of mobile services. In this paper, to better overcome the main bottlenecks of the computation …