[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3338506acmotherconferencesBook PagePublication PagescommConference Proceedingsconference-collections
NetEcon '19: Proceedings of the 14th Workshop on the Economics of Networks, Systems and Computation
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGMETRICS '19: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems Phoenix Arizona 28 June 2019
ISBN:
978-1-4503-6837-7
Published:
28 June 2019

Reflects downloads up to 26 Dec 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Cost per action constrained auctions
Article No.: 1, Pages 1–8https://doi.org/10.1145/3338506.3340269

A standard result from auction theory is that bidding truthfully in a second price auction is a weakly dominant strategy. The result, however, does not apply in the presence of Cost Per Action (CPA) constraints. Such constraints exist, for instance, in ...

extended-abstract
Public Access
Computing optimal taxes in atomic congestion games

When the performance of a system is dictated by the behaviour of its users, self-interested choices can result in sub-optimal system operation, as is the case in road traffic networks. The inefficiency resulting from such selfish behaviour is commonly ...

research-article
Data markets with dynamic arrival of buyers and sellers
Article No.: 3, Pages 1–6https://doi.org/10.1145/3338506.3340270

We propose a market design solution for a market for distributed data. The main challenges addressed by our solution are (1) different data providers produce different databases that can be joined to produce answers for users' queries; (2) data ...

research-article
Public Access
Contract design for purchasing private data using a biased differentially private algorithm
Article No.: 4, Pages 1–6https://doi.org/10.1145/3338506.3340273

Personal information and other types of private data are valuable for both data owners and institutions interested in providing targeted and customized services that require analyzing such data. In this context, privacy is sometimes seen as a commodity: ...

research-article
Public Access
Incentivizing effort in interdependent security games using resource pooling
Article No.: 5, Pages 1–6https://doi.org/10.1145/3338506.3340272

We consider an InterDependent Security (IDS) game with networked agents and positive externality where each agent chooses an effort/investment level for securing itself. The agents are interdependent in that the state of security of one agent depends ...

extended-abstract
Managing adoption under network effects

The consumption of several modern products is marked by strong network effects, i.e., the utility to a consumer improves with the overall adoption in the market. Examples include mobile platforms that significantly rely on user-generated content, social ...

research-article
A characterization of cooperation in dynamic network games
Article No.: 7, Pages 1–6https://doi.org/10.1145/3338506.3340236

This paper explores conditions under which players cooperate in a dynamic network game. Historically, folk theorems have provided a speckled perspective by showing that there exists equilibria where players cooperate, do not cooperate, as well as a ...

research-article
On the cluster admission problem for cloud computing
Article No.: 8, Pages 1–6https://doi.org/10.1145/3338506.3340274

Cloud computing providers must handle heterogeneous customer workloads for resources such as (virtual) CPU or GPU cores. This is particularly challenging if customers, who are already running a job on a cluster, scale their resource usage up and down ...

research-article
Social learning with questions

In social networks, agents use information from (a) private signals (knowledge) they have, (b) learning past agents actions (observations), and (c) comments from contactable experienced agents (experts) to guide their own decisions. With fully ...

extended-abstract
Max-min greedy matching

There has been much recent interest in the online bipartite matching problem of Karp, Vazirani and Vazirani [2], and variations of it, due to its applicability to allocation problems in certain economic settings. A prominent example is online ...

Contributors
  • Microsoft Research Cambridge
  • Grenoble Alpes University
  • University of Rennes
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 10 of 18 submissions, 56%
YearSubmittedAcceptedRate
NetEcon '18181056%
Overall181056%