標(biāo)題: Titlebook: Web and Internet Economics; 12th International C Yang Cai,Adrian Vetta Conference proceedings 2016 Springer-Verlag GmbH Germany 2016 algori [打印本頁] 作者: Covenant 時間: 2025-3-21 18:59
書目名稱Web and Internet Economics影響因子(影響力)
書目名稱Web and Internet Economics影響因子(影響力)學(xué)科排名
書目名稱Web and Internet Economics網(wǎng)絡(luò)公開度
書目名稱Web and Internet Economics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Web and Internet Economics被引頻次
書目名稱Web and Internet Economics被引頻次學(xué)科排名
書目名稱Web and Internet Economics年度引用
書目名稱Web and Internet Economics年度引用學(xué)科排名
書目名稱Web and Internet Economics讀者反饋
書目名稱Web and Internet Economics讀者反饋學(xué)科排名
作者: Inflammation 時間: 2025-3-21 22:42 作者: 土產(chǎn) 時間: 2025-3-22 04:29
A Prior-Independent Revenue-Maximizing Auction for Multiple Additive Bidders,cess to the priors from which the bidders’ values are drawn. In this paper, building on the single sample approach of Dhangwatnotai et al.?[.], we show how the auctioneer can obtain approximately optimal expected revenue in this setting . knowing the priors, as long as the item distributions are regular.作者: linguistics 時間: 2025-3-22 04:37 作者: Intellectual 時間: 2025-3-22 10:09
Yang Cai,Adrian VettaIncludes supplementary material: 作者: 混沌 時間: 2025-3-22 16:05 作者: 毛細(xì)血管 時間: 2025-3-22 17:10
https://doi.org/10.1007/978-3-662-54110-4algorithmic game theory; cloud computation; computational complexity; crowdsourcing; social networks; alg作者: 畏縮 時間: 2025-3-22 23:45
on each others reliability 2) infrastructures are large, dynamically unsynchronized, and complex 3) sharing information about infrastructure vulnerabilities is severely hampered by fears of regulation and competition. Along with these direct obstacles there are larger economic forces that complicate作者: 金桌活畫面 時間: 2025-3-23 03:41
Hau Chan,Albert Xin Jiang,Kevin Leyton-Brown,Ruta Mehtandustrial regulation during the Protectorate of Oliver Cromwell to determine the attitude of Puritan government in its heyday toward industry and incidentally thereby to help toward elucidating the significance—or insignificance—of the Civil Wars and the subsequent religious changes in English econo作者: 臆斷 時間: 2025-3-23 07:53
Xiaotie Deng,Zhe Feng,Christos H. Papadimitriouivars resistant to powdery mildew (.) and suitable for mechanical harvesting (Sergeeva 1981). Gooseberries are widely grown in gardens and smallholdings in many European countries, and wild bushes are exploited in eastern Europe. The main areas of commercial fruit production are in Germany, Poland, 作者: Obscure 時間: 2025-3-23 10:05
Rad Niazadeh,Christopher A. Wilkens “l(fā)inearization”. Some major determinants of linearization are, once again, mutual knowledge but also “economy” for working memory: speakers appear to order thoughts for expression such that load on working memory during speaking is minimized (cf. Levelt, 1979 a, b, 1981).作者: DENT 時間: 2025-3-23 17:02
Rad Niazadeh,Christopher A. Wilkenss are obtained by a?two-step process. First, the material is press cured at differenttimes and temperatures, then, it is post cured in air or under nitrogen at higher temperature andtime, and under atmospheric pressure. Poly(VDF-.-HFP) copolymerscan react with primary, secondary or tertiary monoamin作者: 反饋 時間: 2025-3-23 21:37 作者: neuron 時間: 2025-3-24 00:11
Kira Goldner,Anna R. Karlinompleted. The unit displayed stable performance at 65 K over an 1,150 hour continuous burn-in test at Creare. Further performance mapping tests continued at Phillips Laboratory to fully characterize the cooler’s operational capabilities. The unit is now in endurance test and has accumulated over 2,8作者: mighty 時間: 2025-3-24 04:30 作者: sterilization 時間: 2025-3-24 09:21
Thirumulanathan D.,Rajesh Sundaresan,Y. Naraharixclusive-or the parity of the SPN round function output with the parity of the round key. We also add to all s-boxes an additional 1-bit binary function that implements the combined parity of the inputs and outputs to the s-box for all its (input, output) pairs. These two modifications are used only作者: Ardent 時間: 2025-3-24 14:26
Thirumulanathan D.,Rajesh Sundaresan,Y. Naraharind the increase in key size. 3. Elliptic curves over fields using pseudo-Mersenne primes as standardized by NIST and SECG allow for high performance implementations and show no performance disadvantage over optimal extension fields or prime fields selected specifically for a particular processor arc作者: 哀求 時間: 2025-3-24 18:20
Christos Tzamos,Christopher A. Wilkensns may have been underestimated..In this paper, we present a new chosen-ciphertext Side-Channel Attack on scalar multiplication that applies when optimized parameters, like NIST curves, are used together with some classical anti-SPA and anti-DPA techniques. For a typical exponent size, the attack al作者: 鉤針織物 時間: 2025-3-24 20:54 作者: Enliven 時間: 2025-3-25 01:05
Riccardo Colini-Baldeschi,Stefano Leonardi,Qiang Zhangal correlation across regions in terms of process variations. To amplify the Trojan effect on supply current, we propose a region-based vector generation approach, which divides a circuit-under-test (CUT) into several regions and for each region, finds the test vectors which induce maximum activity 作者: generic 時間: 2025-3-25 07:11 作者: Enteropathic 時間: 2025-3-25 09:29
Ioannis Caragiannis,Aris Filos-Ratsikas,S?ren Kristoffer Stiil Frederiksen,Kristoffer Arnsfelt HanseHensel lifting. (It is well-known that a finite local ring, such as a Galois ring, is a Hensel ring.) We characterize the . of monic minimal polynomials of a finite syndrome sequence over a Hensel ring (Theorem 3). It turns out that the monic minimal polynomials coincide modulo the maximal ideal . o作者: 媒介 時間: 2025-3-25 12:52
Ioannis Caragiannis,Aris Filos-Ratsikas,S?ren Kristoffer Stiil Frederiksen,Kristoffer Arnsfelt Hansece ., since in our case, as in previous cases, the method still works extremely reliably in practice; indeed no counter examples have been obtained. The results in both the partial and general settings are far stronger than might be supposed from a continued-fraction standpoint (the way in which the作者: CAND 時間: 2025-3-25 16:42
Yuqing Kong,Katrina Ligett,Grant Schoenebecktively involved in each message exchange. In this paper we provide a novel inline certified e-mail protocol which satisfies all the most important requirements which have been discussed for certified e-mail. Furthermore, we discuss a prototype implementation of our protocol targeted to the Windows p作者: 輕觸 時間: 2025-3-25 20:57
Yuqing Kong,Katrina Ligett,Grant Schoenebeckl communication complexity (and computational complexity) with .?=? max (3.???2.?+?1, 2.?+?1) wires from . to .. Also with .′?=? max (3.???.?+?1, 2.?+?1) wires from . to ., we are able to further improve the communication complexity of our three phase PSMT protocol. Our second contribution in this p作者: 鴿子 時間: 2025-3-26 01:49
Elliot Anshelevich,Shreyas Sekarsent an implementation of AES using the bitslice technique. We analyze the impact of the architecture of the microprocessor on the performance of bitslice AES. We consider three processors; the Intel Pentium 4, the AMD Athlon 64 and the Intel Core 2. We optimize the implementation to best utilize th作者: Legend 時間: 2025-3-26 05:16 作者: 放棄 時間: 2025-3-26 09:19 作者: HUMP 時間: 2025-3-26 12:38
Hau Chan,Albert Xin Jiang,Kevin Leyton-Brown,Ruta Mehta作者: Ornament 時間: 2025-3-26 17:15 作者: 創(chuàng)作 時間: 2025-3-27 00:48
Aris Anagnostopoulos,Ruggiero Cavallo,Stefano Leonardi,Maxim Sviridenko作者: 假裝是我 時間: 2025-3-27 03:59 作者: 迅速成長 時間: 2025-3-27 05:48
Distributed Methods for Computing Approximate Equilibria,domized expected-polynomial-time algorithm that uses poly-logarithmic communication and finds a 0.6528-WSNE, which beats the previous best known guarantee of 0.732. It can also be applied to the case of ., where we obtain a randomized expected-polynomial-time algorithm that uses poly-logarithmic com作者: 憤慨點吧 時間: 2025-3-27 11:32
Distributed Methods for Computing Approximate Equilibria,domized expected-polynomial-time algorithm that uses poly-logarithmic communication and finds a 0.6528-WSNE, which beats the previous best known guarantee of 0.732. It can also be applied to the case of ., where we obtain a randomized expected-polynomial-time algorithm that uses poly-logarithmic com作者: CUMB 時間: 2025-3-27 14:01 作者: 巨大沒有 時間: 2025-3-27 20:37
Multilinear Games,on, then we show that mixed-strategies have an equivalent representation in terms of . forming a polytope in polynomial dimension..The canonical representation for multilinear games can still be exponential in the number of players, a typical obstacle in multi-player games. Therefore, it is necessar作者: Magisterial 時間: 2025-3-27 22:09
Buying Data from Privacy-Aware Individuals: The Effect of Negative Payments,sts reflect individuals’ valuations of privacy and are modeled by “cost coefficients.” To cope with the uncertainty in the cost coefficients and drive down the data analyst’s cost, we utilize possible negative payments (which penalize individuals with “unacceptably” high valuations of privacy) and e作者: 我要威脅 時間: 2025-3-28 03:00
Buying Data from Privacy-Aware Individuals: The Effect of Negative Payments,sts reflect individuals’ valuations of privacy and are modeled by “cost coefficients.” To cope with the uncertainty in the cost coefficients and drive down the data analyst’s cost, we utilize possible negative payments (which penalize individuals with “unacceptably” high valuations of privacy) and e作者: CLOWN 時間: 2025-3-28 07:05
Bidding Strategies for Fantasy-Sports Auctions,ies for fantasy sports auction drafts, focusing on the design and analysis of simple strategies that achieve good worst-case performance, obtaining a constant fraction of the best value possible, regardless of competing managers’ bids. Our findings may be useful in guiding bidding behavior of fantas作者: BOLUS 時間: 2025-3-28 14:00 作者: 鎮(zhèn)壓 時間: 2025-3-28 14:49 作者: 斑駁 時間: 2025-3-28 20:07
Pricing to Maximize Revenue and Welfare Simultaneously in Large Markets,settings, prices that maximize (approximately) profit also result in high social welfare. Our results holds for general multi-minded buyers in large markets with production costs; we also provide improved guarantees for the important special case of unit-demand buyers.作者: 不可侵犯 時間: 2025-3-29 01:27
Anonymous Auctions Maximizing Revenue, . for regular distributions) and that even posted price mechanisms match those guarantees. Understanding that the real power of anonymous mechanisms comes when the auctioneer can infer the bidder identities accurately, we show a tight . approximation guarantee when each bidder can be confused with 作者: Buttress 時間: 2025-3-29 04:52 作者: 運(yùn)動的我 時間: 2025-3-29 11:09
Conference Program Design with Single-Peaked and Single-Crossing Preferences,n the negative side, we show that a generalization of CPD, where some items must be assigned to specific sets in the solution, is .-hard for dichotomous single-peaked preferences. For single-crossing preferences, we present a dynamic programming exact algorithm that runs in polynomial time if . is c作者: 很像弓] 時間: 2025-3-29 14:42 作者: BARGE 時間: 2025-3-29 16:22 作者: certain 時間: 2025-3-29 22:47 作者: 昏迷狀態(tài) 時間: 2025-3-30 00:34
Putting Peer Prediction Under the Micro(economic)scope and Making Truth-Telling Focal,ssify all equilibria of the peer-prediction mechanism; (2) introduce a new technical tool for understanding scoring rules, which allows us to make truth-telling pay better than any other informative equilibrium; (3) leverage this tool to provide an optimal version of the previous result; that is, we作者: 昆蟲 時間: 2025-3-30 04:54 作者: adjacent 時間: 2025-3-30 11:28
Truthful Mechanisms for Matching and Clustering in an Ordinal World,lems: a 1.76-approximation algorithm for Max-Weight Matching, 2-approximation algorithm for Max .-matching, a 6-approximation algorithm for Densest .-subgraph, and a 2-approximation algorithm for Max Traveling Salesman as long as the hidden weights constitute a metric. Our results are the first non-作者: 晚間 時間: 2025-3-30 15:18
Truthful Mechanisms for Matching and Clustering in an Ordinal World,lems: a 1.76-approximation algorithm for Max-Weight Matching, 2-approximation algorithm for Max .-matching, a 6-approximation algorithm for Densest .-subgraph, and a 2-approximation algorithm for Max Traveling Salesman as long as the hidden weights constitute a metric. Our results are the first non-作者: myocardium 時間: 2025-3-30 18:27
the scope of any one event or country. Oil pipeline attacks in Iraq, massive blackouts in Italy, the United States, and Russia, submarine cable failures in the Atlantic, accidental and intentional failures of infrastructure are an increasing and complex problem. The issue of infrastructure security 作者: 僵硬 時間: 2025-3-30 21:22 作者: 一大塊 時間: 2025-3-31 02:15 作者: 結(jié)合 時間: 2025-3-31 06:05
Rad Niazadeh,Christopher A. Wilkensnguistic decisions, and it is still a mystery how these decisions interact in the generation of fluent speech. Among the conceptual decisions taken are ones of content selection and linear order. Content selection is a matter of deciding what should be expressed, given the speaker’s intentions and g作者: 發(fā)微光 時間: 2025-3-31 11:10
Rad Niazadeh,Christopher A. Wilkensnd oils, and high resistance to ageing and oxidation.Polyvinylidene fluoride (PVDF) is useful as a homopolymer endowed with interesting characteristics.It contains a?high crystallinity rate, but is base sensitive. In addition, VDF can be co- orterpolymerized with several fluorinated monomers, render作者: 駭人 時間: 2025-3-31 13:45
Michal Feldman,Brendan Lucier,Noam Nisanolutions for different boson and spin systems. As a first step we consider in this section the application of the considered above c-number equations for quantum integrable boson and spin systems in quasiclassical region of parameters. We derive one of the main characteristic dynamical parameter, na作者: Veneer 時間: 2025-3-31 18:31
Kira Goldner,Anna R. Karlined for a long-life space cryocooler capable of handling small cooling loads in the mid-cryogenic temperature range of 50 – 80 Kelvin. This class of cryocooler had a multitude of system-level applications. Potential uses included cryogenic cooling of chilled electronics/CMOS, MWIR sensors, missile se作者: 全面 時間: 2025-3-31 23:59 作者: 混雜人 時間: 2025-4-1 05:48 作者: 創(chuàng)造性 時間: 2025-4-1 06:11
Thirumulanathan D.,Rajesh Sundaresan,Y. Narahari We revisited this statement and implemented elliptic curve point multiplication for 160-bit, 192-bit, and 224-bit NIST/SECG curves over GF(p) and RSA-1024 and RSA-2048 on two 8-bit microcontrollers. To accelerate multiple-precision multiplication, we propose a new algorithm to reduce the number of 作者: 清澈 時間: 2025-4-1 13:32
Christos Tzamos,Christopher A. Wilkenstocols and the algorithms used, one of the most serious threats against secret data stored in such devices is Side Channel Analysis..Implementing Public Key Cryptography in low-profile devices such as smart cards is particularly challenging given the computational complexity of the operations involv作者: 薄膜 時間: 2025-4-1 17:24
Christos Tzamos,Christopher A. Wilkensficient implementation of the modular arithmetic. This paper presents the basic concepts and design considerations of the RSA. crypto chip, a high-speed hardware accelerator for long integer modular exponentiation. The major design goal with the RSA was the maximization of performance on several lev作者: Bmd955 時間: 2025-4-1 18:34 作者: indicate 時間: 2025-4-2 00:22 作者: Benzodiazepines 時間: 2025-4-2 04:14
Ioannis Caragiannis,Aris Filos-Ratsikas,S?ren Kristoffer Stiil Frederiksen,Kristoffer Arnsfelt Hanse codes. We also define a corresponding key equation and concentrate on decoding alternant codes when . is a domain or a local ring. Our approach is based on minimal realization (MR) of a finite sequence [.,.], which is related to rational approximation and shortest linear recurrences. The resulting 作者: 溫室 時間: 2025-4-2 09:30
Ioannis Caragiannis,Aris Filos-Ratsikas,S?ren Kristoffer Stiil Frederiksen,Kristoffer Arnsfelt Hansemmon divisors. This leads us to consider the question of “fully” approximate common divisors, i.e. where both integers are only known by approximations. We explain the lattice techniques in both the partial and general cases. As an application of the partial approximate common divisor algorithm we s作者: Eulogy 時間: 2025-4-2 13:32
Yuqing Kong,Katrina Ligett,Grant Schoenebeckvery of messages, e-mail is increasingly used in place of ordinary mail. However, the e-mail service exposes users to several risks related to the lack of security during the message exchange. Furthermore, regular mail offers services which are usually not provided by e-mail, and which are of crucia作者: 繁殖 時間: 2025-4-2 17:02 作者: Canopy 時間: 2025-4-2 20:46
Elliot Anshelevich,Shreyas Sekarance of the application, the speeds of encryption and decryption of the algorithm are critical. To obtain maximum performance from the algorithm, efficient techniques for its implementation must be used and the implementation must be tuned for the specific hardware on which it is running..Bitslice i作者: 嚙齒動物 時間: 2025-4-2 23:58 作者: Engulf 時間: 2025-4-3 04:43 作者: JUST 時間: 2025-4-3 11:01 作者: Antigen 時間: 2025-4-3 12:12