Information Technology Reference
In-Depth Information
References
1. V.Baston and F.Bostock, “A generalized inspection game,”
Naval Research Logistics
,
38
,
(1991) 171-182.
2. E.W.Dijkstra, “Self-stabilizing systems in spite of distributed control,”
Communications of the
ACM
,
17
, 11 (1974) 643-644.
3. S.Dolev, “Self-stabilization,” The MIT Press, (2000).
4. M.Dresher, “A sampling inspection problem in arms control agreements: a game-theoretic
analysis,” Memorandum RM-2972-ARPA, The RAND Corporation, Santa Monica, Califor-
nia, 1962.
5. T.Ferguson and C.Melolidakis, “On the inspection game,”
Naval Research Logistics
,
45
,
(1998) 327-334.
6. A.Garnaev, “A remark on the customs and smuggler game,”
Naval Research Logistics
,
41
,
(1994) 287-293.
7. A.Garnaev, “Search games and other applications of game theory,” Heidelberg, New York,
Springer, (2000).
8. T.Herman, “Superstabilizing mutual exclusion,”
Distributed Computing
,
13
, 1 (2000) 1-17.
9. R.Hohzaki, “A compulsory smuggling model of inspection game taking account of fulfillment
probabilities of players' aims,”
Journal of the Operations Research Society of Japan
,
49
,4
(2006) 306-318.
10. Y.Katayama, E.Ueda, H.Fujiwara and T.Masuzawa, “A latency optimal superstabilizing
mutual exclusion protocol in unidirectional rings,”
Journal of Parallel and Distributed Com-
puting
,
62
, 5 (2002) 865-884.
11. J.Kiniwa and K.Kikuta, “Analysis of an intentional fault which is undetectable by local checks
under an unfair scheduler,” In
Proceedings of the 11th International Symposium on Stabiliza-
tion, Safety, and Security of Distributed Systems (SSS)
, LNCS 5873, (2009) 443-457.
12. M.Maschler, “A price leadership method for solving the inspection's non-constant-sum game,”
Naval Research Logistics Quarterly
,
13
, (1966) 11-33.
13. R.B.Myerson, “Game theory: analysis of conflict,” Harvard University Press (1991).
14. L.Rosaz, “Self-stabilizing token circulation on asynchronous uniform unidirectional rings,”
in
Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing
(2000) 249-258.
15.
M.Thomas and Y.Nisgav, “An infiltration game with time dependent payoff,”
Naval Research
Logistics Quarterly
,
23
, (1976) 297-302.
Search WWH ::
Custom Search