w/in this Title
ACM Transactions on Economics and Computation
A C M (ASSN FOR COMPUTING MAC)
1-5 of 5 reviews
Dynamics at the boundary of game theory and distributed computing
Jaggard A., Lutz N., Schapira M., Wright R. ACM Transactions on Economics and Computation 5(3): 1-20, 2017. Type: Article
The combination of scientific maturity, knowledge, and intelligence can sometimes be the reason and origin of the creation of a worthy artifact. Some amalgams may seem strange at first glance, but more scrutiny demonstrates a great work--a go...
Jan 10 2018
Truthfulness and stochastic dominance with monetary transfers
Hoefer M., Kesselheim T., Vöcking B. ACM Transactions on Economics and Computation 4(2): 1-18, 2016. Type: Article
It is desirable to design auctions in such a way that participants have a financial incentive to provide true information about their interests. At first glance, an ideal description of this truthfulness requirement is that, in all possible situat...
Apr 29 2016
Socially-optimal design of service exchange platforms with imperfect monitoring
Xiao Y., Van Der Schaar M. ACM Transactions on Economics and Computation 3(4): 1-25, 2015. Type: Article
The dilemma of rating mechanisms reminds one of ratings of professors according to their students’ evaluation of their performance in the classroom. Very often, once the students who do not like their professor make their entries, the profes...
Dec 15 2015
To match or not to match: economics of cookie matching in online advertising
Ghosh A., Mahdian M., McAfee R., Vassilvitskii S. ACM Transactions on Economics and Computation 3(2): 1-18, 2015. Type: Article
Cookies are extensively adopted in the current web scenario. A cookie is a small file placed on a user’s computer that permits a website to record information about a previous visit. From a strictly technical perspective, they contribute to ...
Jul 13 2015
Network formation in the presence of contagious risk
Blume L., Easley D., Kleinberg J., Kleinberg R., Tardos É. ACM Transactions on Economics and Computation 1(2): 1-20, 2013. Type: Article
All interconnected networks may reap the benefits of neighboring nodes. But these complex networks, some of which have millions of nodes and edges, risk failure due to a very few compromised or flawed nodes. For example, replica attacks in mobile ...
Nov 7 2013
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2018 ThinkLoud, Inc.