Information Technology Reference
In-Depth Information
References
1. V.Baston and F.Bostock, “A generalized inspection game,” Naval Research Logistics , 38 ,
(1991) 171-182.
2. E.W.Dijkstra, “Self-stabilizing systems in spite of distributed control,” Communications of the
ACM , 17 , 11 (1974) 643-644.
3. S.Dolev, “Self-stabilization,” The MIT Press, (2000).
4. M.Dresher, “A sampling inspection problem in arms control agreements: a game-theoretic
analysis,” Memorandum RM-2972-ARPA, The RAND Corporation, Santa Monica, Califor-
nia, 1962.
5. T.Ferguson and C.Melolidakis, “On the inspection game,” Naval Research Logistics , 45 ,
(1998) 327-334.
6. A.Garnaev, “A remark on the customs and smuggler game,” Naval Research Logistics , 41 ,
(1994) 287-293.
7. A.Garnaev, “Search games and other applications of game theory,” Heidelberg, New York,
Springer, (2000).
8. T.Herman, “Superstabilizing mutual exclusion,” Distributed Computing , 13 , 1 (2000) 1-17.
9. R.Hohzaki, “A compulsory smuggling model of inspection game taking account of fulfillment
probabilities of players' aims,” Journal of the Operations Research Society of Japan , 49 ,4
(2006) 306-318.
10. Y.Katayama, E.Ueda, H.Fujiwara and T.Masuzawa, “A latency optimal superstabilizing
mutual exclusion protocol in unidirectional rings,” Journal of Parallel and Distributed Com-
puting , 62 , 5 (2002) 865-884.
11. J.Kiniwa and K.Kikuta, “Analysis of an intentional fault which is undetectable by local checks
under an unfair scheduler,” In Proceedings of the 11th International Symposium on Stabiliza-
tion, Safety, and Security of Distributed Systems (SSS) , LNCS 5873, (2009) 443-457.
12. M.Maschler, “A price leadership method for solving the inspection's non-constant-sum game,”
Naval Research Logistics Quarterly , 13 , (1966) 11-33.
13. R.B.Myerson, “Game theory: analysis of conflict,” Harvard University Press (1991).
14. L.Rosaz, “Self-stabilizing token circulation on asynchronous uniform unidirectional rings,”
in Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing
(2000) 249-258.
15.
M.Thomas and Y.Nisgav, “An infiltration game with time dependent payoff,” Naval Research
Logistics Quarterly , 23 , (1976) 297-302.
Search WWH ::




Custom Search