Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters
暂无分享,去创建一个
Yi Sun | Zhiqiu Huang | Changbo Ke | Zhiqiu Huang | Yi Sun | Changbo Ke
[1] Daniël Wedema. Games And Information An Introduction To Game Theory 3rd Edition , 2011 .
[2] Albrecht Gnauck,et al. Game theory based models to analyze water conflicts in the Middle Route of the South-to-North Water Transfer Project in China. , 2010, Water research.
[3] Mingchu Li,et al. A Game Theoretic Resource Allocation Model Based on Extended Second Price Sealed Auction in Grid Computing , 2012, J. Comput..
[4] Bruce Bueno de Mesquita,et al. An Introduction to Game Theory , 2014 .
[5] Bruno Crispo,et al. Privacy and Identity Management for Life , 2011, IFIP Advances in Information and Communication Technology.
[6] Qingsheng Zhu,et al. Credit-based Repeated Game Model Applied in Transfer Decision of Opportunistic Network , 2011, J. Softw..
[7] Hui Zhang,et al. Analyzing Competing Behaviors for Graduate Scholarship in China: An Evolutionary Game Theory Approach , 2013 .
[8] J. Nash. THE BARGAINING PROBLEM , 1950, Classics in Game Theory.
[9] Jamal Bentahar,et al. Scheduling Reputation Maintenance in Agent-based Communities Using Game Theory , 2012, J. Softw..
[10] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[11] E. Rowland. Theory of Games and Economic Behavior , 1946, Nature.
[12] Justin Zhijun Zhan,et al. Using gaming strategies for attacker and defender in recommender systems , 2011, 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).
[13] Maryline Laurent,et al. Privacy Policy Negotiation at User ’ s Side Based on P 3 P Tag Value Classification , 2011 .
[14] Michael Mrissa,et al. How to Preserve Privacy in Services Interaction , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[15] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[16] Lisa Rajbhandari,et al. Using Game Theory to Analyze Risk to Privacy: An Initial Insight , 2010, PrimeLife.
[17] Zichuan Xu,et al. An Energy-Aware Multi-Core Scheduler based on Generalized Tit-For-Tat Cooperative Game , 2012, J. Comput..
[18] Yi Mu,et al. A Privacy Policy Framework for Service Aggregation with P3P , 2011, ICIW 2011.
[19] Spyros Kokolakis,et al. An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions , 2012, 2012 16th Panhellenic Conference on Informatics.
[20] Zhiqiu Huang,et al. Supporting negotiation mechanism privacy authority method in cloud computing , 2013, Knowl. Based Syst..
[21] Eric van Damme,et al. Non-Cooperative Games , 2000 .