Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
ACM Transactions on Economics and Computation
A C M (ASSN FOR COMPUTING MAC)
 
   
 
Options:
 
  1-4 of 4 reviews Date Reviewed 
  Truthfulness and stochastic dominance with monetary transfers
Hoefer M., Kesselheim T., Vöcking B.  ACM Transactions on Economics and Computation 4(2): 1-18, 2016. Type: Article

It is desirable to design auctions in such a way that participants have a financial incentive to provide true information about their interests. At first glance, an ideal description of this truthfulness requirement is that, in all possible situat...

Apr 29 2016
  Socially-optimal design of service exchange platforms with imperfect monitoring
Xiao Y., Van Der Schaar M.  ACM Transactions on Economics and Computation 3(4): 1-25, 2015. Type: Article

The dilemma of rating mechanisms reminds one of ratings of professors according to their students’ evaluation of their performance in the classroom. Very often, once the students who do not like their professor make their entries, the profes...

Dec 15 2015
  To match or not to match: economics of cookie matching in online advertising
Ghosh A., Mahdian M., McAfee R., Vassilvitskii S.  ACM Transactions on Economics and Computation 3(2): 1-18, 2015. Type: Article

Cookies are extensively adopted in the current web scenario. A cookie is a small file placed on a user’s computer that permits a website to record information about a previous visit. From a strictly technical perspective, they contribute to ...

Jul 13 2015
  Network formation in the presence of contagious risk
Blume L., Easley D., Kleinberg J., Kleinberg R., Tardos É.  ACM Transactions on Economics and Computation 1(2): 1-20, 2013. Type: Article

All interconnected networks may reap the benefits of neighboring nodes. But these complex networks, some of which have millions of nodes and edges, risk failure due to a very few compromised or flawed nodes. For example, replica attacks in mobile ...

Nov 7 2013
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy