@inproceedings{DBLP:conf/ccs/KifferNSZT24,
author = {Lucianna Kiffer and
Joachim Neu and
Srivatsan Sridhar and
Aviv Zohar and
David Tse},
title = {Nakamoto Consensus under Bounded Processing Capacity},
booktitle = {Proceedings of the 2024 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2024},
pages = {363--377},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3658644.3670347},
doi = {10.1145/3658644.3670347}
}
@inproceedings{DBLP:conf/uss/YaishQZZG24,
author = {Aviv Yaish and
Kaihua Qin and
Liyi Zhou and
Aviv Zohar and
Arthur Gervais},
title = {Speculative Denial-of-Service Attacks In Ethereum},
booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024},
publisher = {{USENIX} Association},
year = {2024},
url = {https://www.usenix.org/conference/usenixsecurity24/presentation/yaish}
}
@inproceedings{DBLP:conf/ccs/YaishSZ23,
author = {Aviv Yaish and
Gilad Stern and
Aviv Zohar},
title = {Uncle Maker: (Time)Stamping Out The Competition in Ethereum},
booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2023},
pages = {135--149},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3576915.3616674},
doi = {10.1145/3576915.3616674}
}
@inproceedings{DBLP:conf/aft/YaishZ23,
author = {Aviv Yaish and
Aviv Zohar},
title = {Correct Cryptocurrency {ASIC} Pricing: Are Miners Overpaying?},
booktitle = {5th Conference on Advances in Financial Technologies, {AFT} 2023},
series = {LIPIcs},
volume = {282},
pages = {2:1--2:25},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
year = {2023},
url = {https://doi.org/10.4230/LIPIcs.AFT.2023.2},
doi = {10.4230/LIPICS.AFT.2023.2}
}
@inproceedings{DBLP:conf/defi/DotanYYTZ23,
author = {Maya Dotan and
Aviv Yaish and
Hsin{-}Chu Yin and
Eytan Tsytkin and
Aviv Zohar},
title = {The Vulnerable Nature of Decentralized Governance in DeFi},
booktitle = {Proceedings of the 2023 Workshop on Decentralized Finance and Security,
DeFi 2023},
pages = {25--31},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3605768.3623539},
doi = {10.1145/3605768.3623539}
}
@inproceedings{DBLP:conf/sigecom/YaishTZ22,
author = {Aviv Yaish and
Saar Tochner and
Aviv Zohar},
title = {Blockchain Stretching {\&} Squeezing: Manipulating Time for Your Best
Interest},
booktitle = {{EC} '22: The 23rd {ACM} Conference on Economics and Computation},
pages = {65--88},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3490486.3538250},
doi = {10.1145/3490486.3538250}
}
@inproceedings{DBLP:conf/uss/DotanTZG22,
author = {Maya Dotan and
Saar Tochner and
Aviv Zohar and
Yossi Gilad},
title = {Twilight: {A} Differentially Private Payment Channel Network},
booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022},
pages = {555--570},
publisher = {{USENIX} Association},
year = {2022},
url = {https://www.usenix.org/conference/usenixsecurity22/presentation/dotan}
}
@inproceedings{DBLP:conf/fc/LotemAMZ22,
author = {Ayelet Lotem and
Sarah Azouvi and
Patrick McCorry and
Aviv Zohar},
title = {Sliding Window Challenge Process for Congestion Detection},
booktitle = {Financial Cryptography and Data Security, {FC} 2022},
series = {Lecture Notes in Computer Science},
volume = {13411},
pages = {512--530},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-18283-9\_25},
doi = {10.1007/978-3-031-18283-9\_25}
}
@article{DBLP:journals/teco/LaviSZ22,
author = {Ron Lavi and
Or Sattath and
Aviv Zohar},
title = {Redesigning Bitcoin's Fee Market},
journal = {{ACM} Trans. Economics and Comput.},
volume = {10},
number = {1},
pages = {5:1--5:31},
year = {2022},
url = {https://doi.org/10.1145/3530799},
doi = {10.1145/3530799}
}
@article{DBLP:journals/csur/DotanPSTZ21,
author = {Maya Dotan and
Yvonne{-}Anne Pignolet and
Stefan Schmid and
Saar Tochner and
Aviv Zohar},
title = {Survey on Blockchain Networking: Context, State-of-the-Art, Challenges},
journal = {{ACM} Comput. Surv.},
volume = {54},
number = {5},
pages = {107:1--107:34},
year = {2022},
url = {https://doi.org/10.1145/3453161},
doi = {10.1145/3453161}
}
@inproceedings{DBLP:conf/allerton/BranzeiSZ22,
author = {Simina Br{\^{a}}nzei and
Erel Segal{-}Halevi and
Aviv Zohar},
title = {How to Charge Lightning: The Economics of Bitcoin Transaction Channels},
booktitle = {58th Annual Allerton Conference on Communication, Control, and Computing,
Allerton 2022},
pages = {1--8},
publisher = {{IEEE}},
year = {2022},
url = {https://doi.org/10.1109/Allerton49937.2022.9929412},
doi = {10.1109/ALLERTON49937.2022.9929412}
}
@inproceedings{DBLP:conf/aft/SompolinskyWZ21,
author = {Yonatan Sompolinsky and
Shai Wyborski and
Aviv Zohar},
title = {{PHANTOM} {GHOSTDAG:} A Scalable Generalization of Nakamoto Consensus},
booktitle = {Proceedings of the 3rd {ACM} Conference on Advances in Financial Technologies,
{AFT} 2021},
pages = {57--70},
publisher = {{ACM}},
year = {2021},
url = {https://doi.org/10.1145/3479722.3480990},
doi = {10.1145/3479722.3480990}
}
@inproceedings{DBLP:conf/fc/MizrahiZ21,
author = {Ayelet Mizrahi and
Aviv Zohar},
title = {Congestion Attacks in Payment Channel Networks},
booktitle = {Financial Cryptography and Data Security, {FC} 2021},
series = {Lecture Notes in Computer Science},
volume = {12675},
pages = {170--188},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-662-64331-0\_9},
doi = {10.1007/978-3-662-64331-0\_9}
}
@inproceedings{DBLP:conf/esorics/GaneshOTZ21,
author = {Chaya Ganesh and
Claudio Orlandi and
Daniel Tschudi and
Aviv Zohar},
title = {Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology,
{ESORICS} 2021 International Workshops, {DPM} 2021 and {CBT} 2021},
series = {Lecture Notes in Computer Science},
volume = {13140},
pages = {173--191},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-93944-1\_12},
doi = {10.1007/978-3-030-93944-1\_12}
}
@article{DBLP:journals/cacm/BohmeEMNRZ20,
author = {Rainer B{\"{o}}hme and
Lisa Eckey and
Tyler Moore and
Neha Narula and
Tim Ruffing and
Aviv Zohar},
title = {Responsible Vulnerability Disclosure in Cryptocurrencies},
journal = {Commun. {ACM}},
volume = {63},
number = {10},
pages = {62--71},
year = {2020},
url = {https://doi.org/10.1145/3372115},
doi = {10.1145/3372115}
}
@inproceedings{DBLP:conf/aft/HarrisZ20,
author = {Jona Harris and
Aviv Zohar},
title = {Flood {\&} Loot: {A} Systemic Attack on The Lightning Network},
booktitle = {Proceedings of the 2nd {ACM} Conference on Advances in Financial Technologies,
{AFT} 2020},
pages = {202--213},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3419614.3423248},
doi = {10.1145/3419614.3423248}
}
@inproceedings{DBLP:conf/aft/TochnerZ020,
author = {Saar Tochner and
Aviv Zohar and
Stefan Schmid},
title = {Route Hijacking and DoS in Off-Chain Networks},
booktitle = {Proceedings of the 2nd {ACM} Conference on Advances in Financial Technologies,
{AFT} 2020},
pages = {228--240},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3419614.3423253},
doi = {10.1145/3419614.3423253}
}
@inproceedings{DBLP:conf/aft/TochnerZ20,
author = {Saar Tochner and
Aviv Zohar},
title = {How to Pick Your Friends: {A} Game Theoretic Approach to {P2P} Overlay
Construction},
booktitle = {Proceedings of the 2nd {ACM} Conference on Advances in Financial Technologies,
{AFT} 2020},
pages = {37--45},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3419614.3423252},
doi = {10.1145/3419614.3423252}
}
@inproceedings{DBLP:conf/icde/CohenRZ20,
author = {Sara Cohen and
Adam Rosenthal and
Aviv Zohar},
title = {Reasoning about the Future in Blockchain Databases},
booktitle = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020},
pages = {1930--1933},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/ICDE48307.2020.00206},
doi = {10.1109/ICDE48307.2020.00206}
}
@inproceedings{DBLP:conf/www/LaviSZ19,
author = {Ron Lavi and
Or Sattath and
Aviv Zohar},
title = {Redesigning Bitcoin's Fee Market},
booktitle = {The World Wide Web Conference, {WWW} 2019},
pages = {2950--2956},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3308558.3313454},
doi = {10.1145/3308558.3313454}
}
@article{DBLP:journals/cacm/SompolinskyZ18,
author = {Yonatan Sompolinsky and
Aviv Zohar},
title = {Bitcoin's Underlying Incentives},
journal = {Commun. {ACM}},
volume = {61},
number = {3},
pages = {46--53},
year = {2018},
url = {https://doi.org/10.1145/3152481},
doi = {10.1145/3152481}
}
@inproceedings{DBLP:conf/esorics/WermanZ18,
author = {Shira Werman and
Aviv Zohar},
title = {Avoiding Deadlocks in Payment Channel Networks},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology,
{ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018},
series = {Lecture Notes in Computer Science},
volume = {11025},
pages = {175--187},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-00305-0\_13},
doi = {10.1007/978-3-030-00305-0\_13}
}
@article{DBLP:journals/iacr/SompolinskyLZ16,
author = {Yonatan Sompolinsky and
Yoad Lewenberg and
Aviv Zohar},
title = {{SPECTRE:} {A} Fast and Scalable Cryptocurrency Protocol},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1159},
year = {2016},
url = {http://eprint.iacr.org/2016/1159}
}
@article{DBLP:journals/corr/SompolinskyZ16,
author = {Yonatan Sompolinsky and
Aviv Zohar},
title = {Bitcoin's Security Model Revisited},
journal = {CoRR},
volume = {abs/1605.09193},
year = {2016},
url = {http://arxiv.org/abs/1605.09193},
eprinttype = {arXiv},
eprint = {1605.09193}
}
@inproceedings{DBLP:conf/sp/ApostolakiZV17,
author = {Maria Apostolaki and
Aviv Zohar and
Laurent Vanbever},
title = {Hijacking Bitcoin: Routing Attacks on Cryptocurrencies},
booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017},
pages = {375--392},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/SP.2017.29},
doi = {10.1109/SP.2017.29}
}
@inproceedings{DBLP:conf/atal/DollbergZ17,
author = {Gil Dollberg and
Aviv Zohar},
title = {Memory-Based Mechanisms for Economic Agents},
booktitle = {Proceedings of the 16th Conference on Autonomous Agents and MultiAgent
Systems, {AAMAS} 2017},
pages = {1523--1525},
publisher = {{ACM}},
year = {2017},
url = {http://dl.acm.org/citation.cfm?id=3091349}
}
@inproceedings{DBLP:conf/nips/FeldmanKLMZ16,
author = {Michal Feldman and
Tomer Koren and
Roi Livni and
Yishay Mansour and
Aviv Zohar},
title = {Online Pricing with Strategic and Patient Buyers},
booktitle = {Advances in Neural Information Processing Systems 29, {NIPS} 2016},
pages = {3864--3872},
year = {2016},
url = {https://proceedings.neurips.cc/paper/2016/hash/44968aece94f667e4095002d140b5896-Abstract.html}
}
@inproceedings{DBLP:conf/fc/SapirshteinSZ16,
author = {Ayelet Sapirshtein and
Yonatan Sompolinsky and
Aviv Zohar},
title = {Optimal Selfish Mining Strategies in Bitcoin},
booktitle = {Financial Cryptography and Data Security, {FC} 2016},
series = {Lecture Notes in Computer Science},
volume = {9603},
pages = {515--532},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-54970-4\_30},
doi = {10.1007/978-3-662-54970-4\_30}
}
@article{DBLP:journals/cacm/Zohar15,
author = {Aviv Zohar},
title = {Bitcoin: Under the Hood},
journal = {Commun. {ACM}},
volume = {58},
number = {9},
pages = {104--113},
year = {2015},
url = {https://doi.org/10.1145/2701411},
doi = {10.1145/2701411}
}
@inproceedings{DBLP:conf/uss/HeilmanKZG15,
author = {Ethan Heilman and
Alison Kendler and
Aviv Zohar and
Sharon Goldberg},
title = {Eclipse Attacks on Bitcoin's Peer-to-Peer Network},
booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 2015},
pages = {129--144},
publisher = {{USENIX} Association},
year = {2015},
url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilman}
}
@inproceedings{DBLP:journals/corr/LevTZ16,
author = {Omer Lev and
Moshe Tennenholtz and
Aviv Zohar},
title = {An Axiomatic Approach to Routing},
booktitle = {Proceedings Fifteenth Conference on Theoretical Aspects of Rationality
and Knowledge, {TARK} 2015},
series = {{EPTCS}},
volume = {215},
pages = {194--206},
year = {2015},
url = {https://doi.org/10.4204/EPTCS.215.14},
doi = {10.4204/EPTCS.215.14}
}
@inproceedings{DBLP:conf/atal/LewenbergBSZR15,
author = {Yoad Lewenberg and
Yoram Bachrach and
Yonatan Sompolinsky and
Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Bitcoin Mining Pools: {A} Cooperative Game Theoretic Analysis},
booktitle = {Proceedings of the 2015 International Conference on Autonomous Agents
and Multiagent Systems, {AAMAS} 2015},
pages = {919--927},
publisher = {{ACM}},
year = {2015},
url = {http://dl.acm.org/citation.cfm?id=2773270}
}
@inproceedings{DBLP:conf/fc/LewenbergSZ15,
author = {Yoad Lewenberg and
Yonatan Sompolinsky and
Aviv Zohar},
title = {Inclusive Block Chain Protocols},
booktitle = {Financial Cryptography and Data Security, {FC} 2015},
series = {Lecture Notes in Computer Science},
volume = {8975},
pages = {528--547},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-47854-7\_33},
doi = {10.1007/978-3-662-47854-7\_33}
}
@inproceedings{DBLP:conf/fc/SompolinskyZ15,
author = {Yonatan Sompolinsky and
Aviv Zohar},
title = {Secure High-Rate Transaction Processing in Bitcoin},
booktitle = {Financial Cryptography and Data Security, {FC} 2015},
series = {Lecture Notes in Computer Science},
volume = {8975},
pages = {507--527},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-47854-7\_32},
doi = {10.1007/978-3-662-47854-7\_32}
}
@inproceedings{DBLP:conf/aaai/CohenZ15,
author = {Sara Cohen and
Aviv Zohar},
title = {An Axiomatic Approach to Link Prediction},
booktitle = {Proceedings of the Twenty-Ninth {AAAI} Conference on Artificial Intelligence,
{AAAI} 2015},
pages = {58--64},
publisher = {{AAAI} Press},
year = {2015},
url = {https://doi.org/10.1609/aaai.v29i1.9189},
doi = {10.1609/AAAI.V29I1.9189}
}
@inproceedings{DBLP:conf/sigecom/BabaioffDOZ12,
author = {Moshe Babaioff and
Shahar Dobzinski and
Sigal Oren and
Aviv Zohar},
title = {On Bitcoin and Red Balloons},
booktitle = {Proceedings of the 13th {ACM} Conference on Electronic Commerce, {EC} 2012},
pages = {56--73},
publisher = {{ACM}},
year = {2012},
url = {https://doi.org/10.1145/2229012.2229022},
doi = {10.1145/2229012.2229022}
}
@inproceedings{DBLP:conf/www/KashLZZ12,
author = {Ian A. Kash and
John K. Lai and
Haoqi Zhang and
Aviv Zohar},
title = {Economics of BitTorrent Communities},
booktitle = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012},
pages = {221--230},
publisher = {{ACM}},
year = {2012},
url = {https://doi.org/10.1145/2187836.2187867},
doi = {10.1145/2187836.2187867}
}
@inproceedings{DBLP:conf/sigecom/NisanSVZ11,
author = {Noam Nisan and
Michael Schapira and
Gregory Valiant and
Aviv Zohar},
title = {Best-Response Auctions},
booktitle = {Proceedings 12th {ACM} Conference on Electronic Commerce, {EC} 2011},
pages = {351--360},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/1993574.1993633},
doi = {10.1145/1993574.1993633}
}
@inproceedings{DBLP:conf/aaai/PochterZR11,
author = {Nir Pochter and
Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Exploiting Problem Symmetries in State-Based Planners},
booktitle = {Proceedings of the Twenty-Fifth {AAAI} Conference on Artificial Intelligence,
{AAAI} 2011},
pages = {1004--1009},
publisher = {{AAAI} Press},
year = {2011},
url = {https://doi.org/10.1609/aaai.v25i1.8014},
doi = {10.1609/AAAI.V25I1.8014}
}
@inproceedings{DBLP:conf/sigecom/EmekKTZ11,
author = {Yuval Emek and
Ron Karidi and
Moshe Tennenholtz and
Aviv Zohar},
title = {Mechanisms for Multi Level Marketing},
booktitle = {Proceedings 12th {ACM} Conference on Electronic Commerce, {EC} 2011},
pages = {209--218},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/1993574.1993606},
doi = {10.1145/1993574.1993606}
}
@inproceedings{DBLP:conf/innovations/NisanSVZ11,
author = {Noam Nisan and
Michael Schapira and
Gregory Valiant and
Aviv Zohar},
title = {Best-Response Mechanisms},
booktitle = {Innovations in Computer Science, {ICS} 2011},
pages = {155--165},
publisher = {Tsinghua University Press},
year = {2011},
url = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/24.html}
}
@inproceedings{DBLP:conf/sigmetrics/GodfreySZS10,
author = {Brighten Godfrey and
Michael Schapira and
Aviv Zohar and
Scott Shenker},
title = {Incentive Compatibility and Dynamics of Congestion Control},
booktitle = {{SIGMETRICS} 2010, Proceedings of the 2010 {ACM} {SIGMETRICS} International
Conference on Measurement and Modeling of Computer Systems},
pages = {95--106},
publisher = {{ACM}},
year = {2010},
url = {https://doi.org/10.1145/1811039.1811051},
doi = {10.1145/1811039.1811051}
}
@inproceedings{DBLP:conf/aaai/PochterZRF10,
author = {Nir Pochter and
Aviv Zohar and
Jeffrey S. Rosenschein and
Ariel Felner},
title = {Search Space Reduction Using Swamp Hierarchies},
booktitle = {Proceedings of the Twenty-Fourth {AAAI} Conference on Artificial Intelligence,
{AAAI} 2010},
pages = {155--160},
publisher = {{AAAI} Press},
year = {2010},
url = {https://doi.org/10.1609/aaai.v24i1.7556},
doi = {10.1609/AAAI.V24I1.7556}
}
@inproceedings{DBLP:conf/aaai/AshlagiTZ10,
author = {Itai Ashlagi and
Moshe Tennenholtz and
Aviv Zohar},
title = {Competing Schedulers},
booktitle = {Proceedings of the Twenty-Fourth {AAAI} Conference on Artificial Intelligence,
{AAAI} 2010},
pages = {691--696},
publisher = {{AAAI} Press},
year = {2010},
url = {https://doi.org/10.1609/aaai.v24i1.7631},
doi = {10.1609/AAAI.V24I1.7631}
}
@article{DBLP:journals/siamcomp/LevinSZ11,
author = {Hagay Levin and
Michael Schapira and
Aviv Zohar},
title = {Interdomain Routing and Games},
journal = {{SIAM} J. Comput.},
volume = {40},
number = {6},
pages = {1892--1912},
year = {2011},
url = {https://doi.org/10.1137/080734017},
doi = {10.1137/080734017}
}
@article{DBLP:journals/ai/ProcacciaZPR09,
author = {Ariel D. Procaccia and
Aviv Zohar and
Yoni Peleg and
Jeffrey S. Rosenschein},
title = {The Learnability of Voting Rules},
journal = {Artif. Intell.},
volume = {173},
number = {12-13},
pages = {1133--1149},
year = {2009},
url = {https://doi.org/10.1016/j.artint.2009.03.003},
doi = {10.1016/J.ARTINT.2009.03.003}
}
@inproceedings{DBLP:conf/infocom/SamiSZ09,
author = {Rahul Sami and
Michael Schapira and
Aviv Zohar},
title = {Searching for Stability in Interdomain Routing},
booktitle = {{INFOCOM} 2009, 28th {IEEE} International Conference on Computer Communications},
pages = {549--557},
publisher = {{IEEE}},
year = {2009},
url = {https://doi.org/10.1109/INFCOM.2009.5061961},
doi = {10.1109/INFCOM.2009.5061961}
}
@inproceedings{DBLP:conf/atal/ZoharR09,
author = {Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Adding Incentives to File-Sharing Systems},
booktitle = {8th International Conference on Autonomous Agents and Multiagent Systems,
{AAMAS} 2009},
pages = {859--866},
publisher = {{IFAAMAS}},
year = {2009},
url = {https://dl.acm.org/citation.cfm?id=1558131}
}
@inproceedings{DBLP:conf/atal/TennenholtzZ09,
author = {Moshe Tennenholtz and
Aviv Zohar},
title = {Learning Equilibria in Repeated Congestion Games},
booktitle = {8th International Conference on Autonomous Agents and Multiagent Systems,
{AAMAS} 2009},
pages = {233--240},
publisher = {{IFAAMAS}},
year = {2009},
url = {https://dl.acm.org/citation.cfm?id=1558045}
}
@inproceedings{DBLP:conf/atal/PochterZR09,
author = {Nir Pochter and
Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Using Swamps to Improve Optimal Pathfinding},
booktitle = {8th International Conference on Autonomous Agents and Multiagent Systems,
{AAMAS} 2009},
pages = {1163--1164},
publisher = {{IFAAMAS}},
year = {2009},
url = {https://dl.acm.org/citation.cfm?id=1558192}
}
@article{DBLP:journals/jair/MeirPRZ08,
author = {Reshef Meir and
Ariel D. Procaccia and
Jeffrey S. Rosenschein and
Aviv Zohar},
title = {Complexity of Strategic Behavior in Multi-Winner Elections},
journal = {J. Artif. Intell. Res.},
volume = {33},
pages = {149--178},
year = {2008},
url = {https://doi.org/10.1613/jair.2566},
doi = {10.1613/JAIR.2566}
}
@article{DBLP:journals/scw/ProcacciaRZ08,
author = {Ariel D. Procaccia and
Jeffrey S. Rosenschein and
Aviv Zohar},
title = {On the Complexity of Achieving Proportional Representation},
journal = {Soc. Choice Welf.},
volume = {30},
number = {3},
pages = {353--362},
year = {2008},
url = {https://doi.org/10.1007/s00355-007-0235-2},
doi = {10.1007/S00355-007-0235-2}
}
@inproceedings{DBLP:conf/atal/ProcacciaZR08,
author = {Ariel D. Procaccia and
Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Automated Design of Scoring Rules by Learning from Examples},
booktitle = {7th International Joint Conference on Autonomous Agents and Multiagent
Systems, {AAMAS} 2008},
pages = {951--958},
publisher = {{IFAAMAS}},
year = {2008},
url = {https://dl.acm.org/citation.cfm?id=1402355}
}
@inproceedings{DBLP:conf/stoc/LevinSZ08,
author = {Hagay Levin and
Michael Schapira and
Aviv Zohar},
title = {Interdomain Routing and Games},
booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
{STOC} 2008},
pages = {57--66},
publisher = {{ACM}},
year = {2008},
url = {https://doi.org/10.1145/1374376.1374388},
doi = {10.1145/1374376.1374388}
}
@inproceedings{DBLP:conf/wine/NisanSZ08,
author = {Noam Nisan and
Michael Schapira and
Aviv Zohar},
title = {Asynchronous Best-Reply Dynamics},
booktitle = {Internet and Network Economics, 4th International Workshop, {WINE} 2008},
series = {Lecture Notes in Computer Science},
volume = {5385},
pages = {531--538},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-92185-1\_59},
doi = {10.1007/978-3-540-92185-1\_59}
}
@article{DBLP:journals/ai/ZoharR08,
author = {Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Mechanisms for Information Elicitation},
journal = {Artif. Intell.},
volume = {172},
number = {16-17},
pages = {1917--1939},
year = {2008},
url = {https://doi.org/10.1016/j.artint.2008.08.005},
doi = {10.1016/J.ARTINT.2008.08.005}
}
@inproceedings{DBLP:conf/aaai/ProcacciaZPR07,
author = {Ariel D. Procaccia and
Aviv Zohar and
Yoni Peleg and
Jeffrey S. Rosenschein},
title = {Learning Voting Trees},
booktitle = {Proceedings of the Twenty-Second {AAAI} Conference on Artificial Intelligence,
{AAAI} 2007},
pages = {110--115},
publisher = {{AAAI} Press},
year = {2007},
url = {http://www.aaai.org/Library/AAAI/2007/aaai07-016.php}
}
@inproceedings{DBLP:conf/ijcai/ProcacciaRZ07,
author = {Ariel D. Procaccia and
Jeffrey S. Rosenschein and
Aviv Zohar},
title = {Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination},
booktitle = {{IJCAI} 2007, Proceedings of the 20th International Joint Conference
on Artificial Intelligence},
pages = {1476--1481},
year = {2007},
url = {http://ijcai.org/Proceedings/07/Papers/238.pdf}
}
@inproceedings{DBLP:conf/aaai/ZoharR06,
author = {Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Mechanisms for Partial Information Elicitation: The Truth, but Not
the Whole Truth},
booktitle = {Proceedings of the Twenty-First National Conference on Artificial Intelligence,
{AAAI} 2006},
pages = {734--739},
publisher = {{AAAI} Press},
year = {2006},
url = {http://www.aaai.org/Library/AAAI/2006/aaai06-117.php}
}
@inproceedings{DBLP:conf/aaai/ZoharR06a,
author = {Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Robust Mechanisms for Information Elicitation},
booktitle = {Proceedings of the Twenty-First National Conference on Artificial Intelligence,
{AAAI} 2006},
pages = {740--746},
publisher = {{AAAI} Press},
year = {2006},
url = {http://www.aaai.org/Library/AAAI/2006/aaai06-118.php}
}
@inproceedings{DBLP:conf/atal/ZoharR05,
author = {Aviv Zohar and
Jeffrey S. Rosenschein},
title = {Using Tags to Evolve Trust and Cooperation Between Groups},
booktitle = {4th International Joint Conference on Autonomous Agents and Multiagent
Systems, {AAMAS} 2005},
pages = {1199--1200},
publisher = {{ACM}},
year = {2005},
url = {https://doi.org/10.1145/1082473.1082692},
doi = {10.1145/1082473.1082692}
}
Return toBack to the main manuscript. See also: