Calculated based on number of publications stored in Pure and citations from Scopus
20052024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Nakamoto Consensus under Bounded Processing Capacity

    Kiffer, L., Neu, J., Sridhar, S., Zohar, A. & Tse, D., 9 Dec 2024, CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 363-377 15 p. (CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Speculative Denial-of-Service Attacks in Ethereum

    Yaish, A., Qin, K., Zhou, L., Zohar, A. & Gervais, A., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 3531-3548 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2023

    Correct Cryptocurrency ASIC Pricing: Are Miners Overpaying?

    Yaish, A. & Zohar, A., 1 Oct 2023, 5th Conference on Advances in Financial Technologies, AFT 2023. Bonneau, J. & Weinberg, S. M. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 2:1-2:25 25 p. 2. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 282).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • The Vulnerable Nature of Decentralized Governance in DeFi

    Dotan, M., Yaish, A., Yin, H. C., Tsytkin, E. & Zohar, A., 30 Nov 2023, DeFi 2023 - Proceedings of the 2023 Workshop on Decentralized Finance and Security. Association for Computing Machinery, Inc, p. 25-31 7 p. (DeFi 2023 - Proceedings of the 2023 Workshop on Decentralized Finance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • Uncle Maker: (Time)Stamping Out The Competition in Ethereum

    Yaish, A., Stern, G. & Zohar, A., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 135-149 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • 2022

    Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest

    Yaish, A., Tochner, S. & Zohar, A., 12 Jul 2022, EC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation. Association for Computing Machinery, Inc, p. 65-88 24 p. (EC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • How to Charge Lightning: The Economics of Bitcoin Transaction Channels

    Branzei, S., Segal-Halevi, E. & Zohar, A., 2022, 2022 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2022. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. (2022 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Sliding Window Challenge Process for Congestion Detection

    Lotem, A., Azouvi, S., McCorry, P. & Zohar, A., 2022, Financial Cryptography and Data Security - 26th International Conference, FC 2022, Revised Selected Papers. Eyal, I. & Garay, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 512-530 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13411 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Twilight: A Differentially Private Payment Channel Network

    Dotan, M., Tochner, S., Zohar, A. & Gilad, Y., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 555-570 16 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies

    Ganesh, C., Orlandi, C., Tschudi, D. & Zohar, A., 2022, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Revised Selected Papers. Garcia-Alfaro, J., Muñoz-Tapia, J. L., Navarro-Arribas, G. & Soriano, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 173-191 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13140 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    Congestion Attacks in Payment Channel Networks

    Mizrahi, A. & Zohar, A., 2021, Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers. Borisov, N. & Diaz, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 170-188 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12675 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    35 Scopus citations
  • PHANTOM GHOSTDAG: A scalable generalization of Nakamoto consensus: September 2, 2021

    Sompolinsky, Y., Wyborski, S. & Zohar, A., 26 Sep 2021, AFT 2021 - Proceedings of the 2021 3rd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 57-70 14 p. (AFT 2021 - Proceedings of the 2021 3rd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • 2020

    Flood & Loot: A Systemic Attack on the Lightning Network

    Harris, J. & Zohar, A., 21 Oct 2020, AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 202-213 12 p. (AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Scopus citations
  • How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction

    Tochner, S. & Zohar, A., 21 Oct 2020, AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 37-45 9 p. (AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Reasoning about the future in blockchain databases

    Cohen, S., Rosenthal, A. & Zohar, A., Apr 2020, Proceedings - 2020 IEEE 36th International Conference on Data Engineering, ICDE 2020. IEEE Computer Society, p. 1930-1933 4 p. 9101185. (Proceedings - International Conference on Data Engineering; vol. 2020-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Route Hijacking and DoS in Off-Chain Networks

    Tochner, S., Zohar, A. & Schmid, S., 21 Oct 2020, AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 228-240 13 p. (AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • SOK: Cryptocurrency networking context, state-of-the-art, challenges

    Dotan, M., Pignolet, Y. A., Schmid, S., Tochner, S. & Zohar, A., 25 Aug 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery, (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2019

    Redesigning Bitcoin's fee market

    Lavi, R., Sattath, O. & Zohar, A., 13 May 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 2950-2956 7 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • 2018

    Avoiding Deadlocks in Payment Channel Networks

    Werman, S. & Zohar, A., 2018, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Proceedings. Garcia-Alfaro, J., Herrera-Joancomartí, J., Livraga, G. & Rios, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 175-187 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11025 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • 2017

    Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

    Apostolaki, M., Zohar, A. & Vanbever, L., 23 Jun 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 375-392 18 p. 7958588. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    360 Scopus citations
  • Memory-based mechanisms for economic agents

    Dollberg, G. & Zohar, A., 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. Durfee, E., Winikoff, M., Larson, K. & Das, S. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1523-1525 3 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Optimal selfish mining strategies in bitcoin

    Sapirshtein, A., Sompolinsky, Y. & Zohar, A., 2017, Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers. Preneel, B. & Grossklags, J. (eds.). Springer Verlag, p. 515-532 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9603 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    363 Scopus citations
  • Recent trends in decentralized cryptocurrencies

    Zohar, A., 19 Jun 2017, STOC 2017 - Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. McKenzie, P., King, V. & Hatami, H. (eds.). Association for Computing Machinery, p. 1 1 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. Part F128415).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Securing and scaling cryptocurrencies

    Zohar, A., 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 5161-5165 5 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    10 Scopus citations
  • 2015

    An axiomatic approach to link prediction

    Cohen, S. & Zohar, A., 1 Jun 2015, Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI 2015 and the 27th Innovative Applications of Artificial Intelligence Conference, IAAI 2015. AI Access Foundation, p. 58-64 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Bitcoin mining pools: A cooperative game theoretic analysis

    Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A. & Rosenschein, J. S., 2015, AAMAS 2015 - Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Elkind, E., Weiss, G., Yolum, P. & Bordini, R. H. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 919-927 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    196 Scopus citations
  • Eclipse attacks on Bitcoin’s peer-to-peer network

    Heilman, E., Kendler, A., Zohar, A. & Goldberg, S., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 129-144 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    672 Scopus citations
  • Inclusive block chain protocols

    Lewenberg, Y., Sompolinsky, Y. & Zohar, A., 2015, Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Okamoto, T. & Bohme, R. (eds.). Springer Verlag, p. 528-547 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8975).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    240 Scopus citations
  • Secure high-rate transaction processing in bitcoin

    Sompolinsky, Y. & Zohar, A., 2015, Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Okamoto, T. & Bohme, R. (eds.). Springer Verlag, p. 507-527 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8975).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    506 Scopus citations
  • 2012

    Economics of BitTorrent communities

    Kash, I. A., Lai, J. K., Zhang, H. & Zohar, A., 2012, WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web. p. 221-230 10 p. (WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • On bitcoin and red balloons

    Babaioff, M., Dobzinski, S., Oren, S. & Zohar, A., 2012, EC '12 - Proceedings of the 13th ACM Conference on Electronic Commerce. p. 56-73 18 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    166 Scopus citations
  • 2011

    Best-response auctions

    Nisan, N., Schapira, M., Valiant, G. & Zohar, A., 2011, EC'11 - Proceedings of the 12th ACM Conference on Electronic Commerce. p. 351-359 9 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • Best-Response Mechanisms

    Nisan, N., Schapira, M., Valiant, G. & Zohar, A., 2011, Innovations in Computer Science - ICS 2011: Tsinghua University, Beijing, China, January 7-9, 2011. Tsinghua University Press, p. 155-165 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Exploiting problem symmetries in state-based planners

    Pochter, N., Zohar, A. & Rosenschein, J. S., 2011, AAAI-11 / IAAI-11 - Proceedings of the 25th AAAI Conference on Artificial Intelligence and the 23rd Innovative Applications of Artificial Intelligence Conference. p. 1004-1009 6 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • Incentive-compatible distributed greedy protocols

    Nisan, N., Schapira, M., Valiant, G. & Zohar, A., 2011, PODC'11 - Proceedings of the 2011 ACM Symposium Principles of Distributed Computing. p. 335-336 2 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Mechanisms for multi-level marketing

    Emek, Y., Karidi, R., Tennenholtz, M. & Zohar, A., 2011, EC'11 - Proceedings of the 12th ACM Conference on Electronic Commerce. p. 209-218 10 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    66 Scopus citations
  • 2010

    Competing Schedulers

    Ashlagi, I., Tennenholtz, M. & Zohar, A., 15 Jul 2010, Proceedings of the 24th AAAI Conference on Artificial Intelligence, AAAI 2010. AAAI Press, p. 691-696 6 p. (Proceedings of the 24th AAAI Conference on Artificial Intelligence, AAAI 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Incentive compatibility and dynamics of congestion control

    Godfrey, P. B., Schapira, M., Zohar, A. & Shenker, S., 2010, SIGMETRICS'10 - Proceedings of the 2010 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPEC. ISSUE ed. p. 95-106 12 p. (Performance Evaluation Review; vol. 38, no. 1 SPEC. ISSUE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Search space reduction using swamp hierarchies

    Pochter, N., Zohar, A., Rosenschein, J. S. & Felner, A., 2010, Proceedings of the 3rd Annual Symposium on Combinatorial Search, SoCS 2010. p. 155-156 2 p. (Proceedings of the 3rd Annual Symposium on Combinatorial Search, SoCS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Search space reduction using swamp hierarchies

    Pochter, N., Zohar, A., Rosenschein, J. S. & Felner, A., 2010, AAAI-10 / IAAI-10 - Proceedings of the 24th AAAI Conference on Artificial Intelligence and the 22nd Innovative Applications of Artificial Intelligence Conference. AI Access Foundation, p. 155-160 6 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2009

    Adding incentives to file-sharing systems

    Zohar, A. & Rosenschein, J. S., 2009, 8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 624-631 8 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Learning equilibria in repeated congestion games

    Tennenholtz, M. & Zohar, A., 2009, 8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 926-933 8 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Searching for stability in interdomain routing

    Sami, R., Schapira, M. & Zohar, A., 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 549-557 9 p. 5061961. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • Using swamps to improve optimal pathfinding

    Pochter, N., Zohar, A. & Rosenschein, J. S., 2009, 8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1318-1319 2 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2008

    Asynchronous best-reply dynamics

    Nisan, N., Schapira, M. & Zohar, A., 2008, Internet and Network Economics - 4th International Workshop, WINE 2008, Proceedings. p. 531-538 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5385 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Automated design of scoring rules by learning from examples

    Procaccia, A. D., Zohar, A. & Rosenschein, J. S., 2008, 7th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2008. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 933-940 8 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Interdomain routing and games

    Levin, H., Schapira, M. & Zohar, A., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. Association for Computing Machinery (ACM), p. 57-66 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    45 Scopus citations
  • 2007

    Learning voting trees

    Procaccia, A. D., Zohar, A., Peleg, Y. & Rosenschein, J. S., 2007, AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference. p. 110-115 6 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2006

    Mechanisms for partial information elicitation: The truth, but not the whole truth

    Zohar, A. & Rosenschein, J. S., 2006, Proceedings of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conference, AAAI-06/IAAI-06. p. 734-739 6 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Robust mechanisms for information elicitation

    Zohar, A. & Rosenschein, J. S., 2006, Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems. p. 1202-1204 3 p. (Proceedings of the International Conference on Autonomous Agents; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.