zbMATH — the first resource for mathematics

On a network creation game. (English) Zbl 1322.91013
Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC ’03, Boston, MA, USA, July 13–16, 2003. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-708-7). 347-351 (2003).

91A43 Games involving graphs
68M10 Network design and communication in computer systems
68M12 Network protocols
68R10 Graph theory (including graph drawing) in computer science
91A10 Noncooperative games
91A40 Other game-theoretic models
PDF BibTeX Cite
Full Text: DOI
[1] RJ Anderson, ’Security Engineering -a Guide to Building Dependable Distributed Systems ’, Wiley (2001) ISBN 0-471-38922-6
[2] RJ Anderson, ”TCPA/Palladium FAQ”, at http ://www. cl. cam. ac. uk/users/r j a14/ tcpa-faq, html
[3] M Mcgee, ”HP inkjet cartridges have built-in expiry dates -Carly’s cunning consumable plan”, The Inquirer, 29 April 2003, at http ://www. theinquirer, net/Tarti cle=9220
[4] ”Ink Cartridges with Built-In Self-Destruct Dates”, Slashdot, at http://slashdot, org/ articles/03/04/30/1155250,shtml
[5] ’ Computer Chip Usage in Toner Cartridges and Impact on the Aftermarket: Past, Current and Future”, Static Control, Inc., at http ://www. scc-inc, com/special/oemwarf are/ whitepaper/def cult. htm
[6] ”Lexmark invokes DMCA in Toner Suit”, Slashdot, at http ://slashdot. org/article, pl? sid=O3/O1/O9/1228217 mode=thread&tid=123
[7] ”Prepared Statements and Press Releases”, Static Control, Inc., at http://www, see-inc, com/ special/oemwarf are/lexmark vs scc. htm
[8] M Broersma, ”Printer makers rapped over refill restrictions”, ZDnet Dec 20 2002, at http ://news. zdnet: co. uk/st ory/0, ,t269-s2127877,00, html
[9] HR Varian, ”New Chips Can Keep a Tight Rein on Customers”, New York Times July 4 2002, at http ://www. nytimes, com/2002/07/04/ business/O4SCEN, html
[10] ”Motorola Announces Availability Of New Wireless Phone Batteries for Increased Performance and Safety, Featuring New Hologram Design”, Motorola Press Release, July 23, 1998; pulled after being referenced in
[11] [2]; now archived at http ://www. ftp. cl. cam. ac. uk/ftp/users/ rj a14/mot ot ola_bat t ery_auth, html
[12] D Becker, ”Sony loses Australian copyright case”, on CNN.com, July 26 2002, at http: //rss. com. com/2100-1040-946640, html?t ag=rn
[13] N Pickler, ”Mechanics Struggle With Diagnostics”, AP, June 24 2002; previously at radicus.net; pulled after being referenced in
[14] [2]; now archived at http ://www. ftp. cl. cam. ac. uk/ ftp/users/r j al4/car-diagnostics, html
[15] LM Ausubel, P Milgrom, ”Ascending Auctions with Package Bidding”, 2002, at http ://www. ausubel, com/
[16] Trusted Computing Group, http ://www. trustedcomput inggroup, org/
[17] J Lettice ”Bad publicity, clashes trigger MS Palladium name change”, The Register, Jan 27 2003, at http://www, theregister, co.uk/ content/4/29039, html
[18] R Stallman, ”Can you trust your computer?”, at http ://newsf orge. com/newsf orge/02/10/21/ 1449250. shtml?tid=19
[19] Microsoft Corp., ”Windows Server 2003”, Feb 20, 2003, at http: //www .microsoft. com/windows server2003/rm
[20] J Manferdelli, ”An Open and Interoperable Foundation for Secure Computing”, in Windows Trusted Platform Technologies Information Newsletter March 2003
[21] JS Erickson, ”OpenDRM’, at http://xml. coverpages, org/Erickson0penDRM20020902, pdf
[22] A Huang, ”Keeping Secrets in Hardware: the Microsoft Xbox Case Study”, May 26 2002, at http ://web. mit. edu/bunnie/www/pro j/chat ak/ AIM-2002- 008. pdf · Zbl 1019.68556
[23] P Thurrott, ”Microsoft’s Secret Plan to Secure the PC”, WinInfo, June 23, 2002, at http ://www. wininf ormant, com/Articles/ Index. cfm?ArticleID=25681
[24] S Lewis,. ”How Much is Stronger DRM Worth?” at Second International Workshop on Economics and Information Security, at http: //www. cpppe, umd. edu/rhsmith3/index, html
[25] SE Schechter, RA Greenstadt, MD Smith, ”Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment”, at Second International Workshop on Economics and Information Security, at http: //www. cpppe, umd. edu/rhsmith3/index, html
[26] C Shapiro, H Varian, ’Information Rules’, Harvard Business School Press (1998), ISBN 0-87584-863-X
[27] A Gawer, MA Cusumano, ”Platform Leadership: How Intel, Microsoft, and Cisco Drive Industry Innovation”, Harvard Business School Press (2002), ISBN 1-57851-514-9
[28] J Brockmeier, ”The Ultimate Lock-In”, Yahoo News. Mar 12 2003, at http://story.news. yahoo, com/news ?tmpl=story2&cid=75 ncid= 738 e=9 u=/nf/20030312/t c_nf/20982
[29] RJ Anderson, ”Why Information Security is Hard -An Economic Perspective”, in Proceedings of the Seventeenth Computer Security Applications Conference IEEE Computer Society Press (2001), ISBN 0-7695-1405-7, pp 358-365, at http://www. cl.cam. ac. uk/ftp/users/rj al4/econ, pdf
[30] C Shapiro, ”Antitrust Limits to Patent Settlements”, preprint, at http://faculty, haas. berkeley, edu/shapiro/sett le. pdf l0
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.