A data mining framework for building intrusion detection models

W Lee, SJ Stolfo, KW Mok - … of the 1999 IEEE Symposium on …, 1999 - ieeexplore.ieee.org
There is often the need to update an installed intrusion detection system (IDS) due to new
attack methods or upgraded computing environments. Since many current IDSs are …

[图书][B] Game theory and mechanism design

Y Narahari - 2014 - books.google.com
This book offers a self-sufficient treatment of a key tool, game theory and mechanism design,
to model, analyze, and solve centralized as well as decentralized design problems involving …

Foundations of mechanism design: A tutorial part 1-key concepts and classical results

D Garg, Y Narahari, S Gujar - Sadhana, 2008 - Springer
Mechanism design, an important tool in microeconomics, has found widespread
applications in modelling and solving decentralized design problems in many branches of …

On the hardness of being truthful

C Papadimitriou, M Schapira… - 2008 49th Annual IEEE …, 2008 - ieeexplore.ieee.org
The central problem in computational mechanism design is the tension between incentive
compatibility and computational efficiency. We establish the first significant approximability …

Foundations of mechanism design: A tutorial Part 2-Advanced concepts and results

D Garg, Y Narahari, S Gujar - Sadhana, 2008 - Springer
Mechanism design, an important tool in microeconomics, has found widespread
applications in modelling and solving decentralized design problems in many branches of …

Robertsʼ Theorem with neutrality: A social welfare ordering approach

D Mishra, A Sen - Games and Economic Behavior, 2012 - Elsevier
We consider dominant strategy implementation in private values settings, when agents have
multi-dimensional types, the set of alternatives is finite, monetary transfers are allowed, and …

Algorithms and mechanisms for procuring services with uncertain durations using redundancy

S Stein, EH Gerding, AC Rogers, K Larson… - Artificial Intelligence, 2011 - Elsevier
In emerging service-oriented systems, such as computational clouds or grids, software
agents are able to automatically procure distributed services to complete computational …

[PDF][PDF] Computationally efficient approximation mechanisms

R Lavi - Algorithmic Game Theory, 2007 - algo.informatik.uni-frankfurt.de
We study the integration of game theoretic and computational considerations. In particular,
we study the design of computationally efficient and incentive compatible mechanisms, for …

Mechanism design with two alternatives in quasi-linear environments

T Marchant, D Mishra - Social Choice and Welfare, 2015 - Springer
We study mechanism design in quasi-linear private values environments when there are two
alternatives. We show that under a mild range condition, every implementable allocation …

Truthful implementation and preference aggregation in restricted domains

JC Carbajal, A McLennan, R Tourky - Journal of Economic Theory, 2013 - Elsevier
In a setting where agents have quasi-linear utilities over social alternatives and a
transferable commodity, we consider three properties that a social choice function may …