A data mining framework for building intrusion detection models

W Lee, SJ Stolfo, KW Mok - … of the 1999 IEEE Symposium on …, 1999 - ieeexplore.ieee.org
There is often the need to update an installed intrusion detection system (IDS) due to new
attack methods or upgraded computing environments. Since many current IDSs are …

A game-theoretic method of fair resource allocation for cloud computing services

G Wei, AV Vasilakos, Y Zheng, N Xiong - The journal of supercomputing, 2010 - Springer
As cloud-based services become more numerous and dynamic, resource provisioning
becomes more and more challenging. A QoS constrained resource allocation problem is …

On the hardness of being truthful

C Papadimitriou, M Schapira… - 2008 49th Annual IEEE …, 2008 - ieeexplore.ieee.org
The central problem in computational mechanism design is the tension between incentive
compatibility and computational efficiency. We establish the first significant approximability …

Truthful mechanism design for multi-dimensional scheduling via cycle monotonicity

R Lavi, C Swamy - Proceedings of the 8th ACM conference on Electronic …, 2007 - dl.acm.org
We consider the problem of makespan minimization on m unrelated machines in the context
of algorithmic mechanism design, where the machines are the strategic players. This is a …

Mechanism design for machine scheduling problems: Classification and literature overview

D Kress, S Meiswinkel, E Pesch - OR Spectrum, 2018 - Springer
This paper provides a literature overview on (direct revelation) algorithmic mechanism
design in the context of machine scheduling problems. Here, one takes a game-theoretic …

A lower bound for scheduling mechanisms

G Christodoulou, E Koutsoupias, A Vidali - Algorithmica, 2009 - Springer
We study the mechanism design problem of scheduling tasks on n unrelated machines in
which the machines are the players of the mechanism. The problem was proposed and …

Interdomain routing and games

H Levin, M Schapira, A Zohar - Proceedings of the fortieth annual ACM …, 2008 - dl.acm.org
We present a game-theoretic model that captures many of the intricacies of interdomain
routing in today's Internet. In this model, the strategic agents are source nodes located on a …

An optimal lower bound for anonymous scheduling mechanisms

I Ashlagi, S Dobzinski, R Lavi - Proceedings of the 10th ACM conference …, 2009 - dl.acm.org
We consider the problem of designing truthful mechanisms to minimize the makespan on m
unrelated machines. In their seminal paper, Nisan and Ronen [14] showed a lower bound of …

[PDF][PDF] A proof of the Nisan-Ronen conjecture

G Christodoulou, E Koutsoupias, A Kovács - Proceedings of the 55th …, 2023 - dl.acm.org
A Proof of the Nisan-Ronen Conjecture Page 1 A Proof of the Nisan-Ronen Conjecture George
Christodoulou∗ Aristotle University of Thessaloniki School of Informatics and Archimedes/RC …

Scheduling without payments

E Koutsoupias - Theory of Computing Systems, 2014 - Springer
We consider mechanisms without payments for the problem of scheduling unrelated
machines. Specifically, we consider truthful in expectation randomized mechanisms under …