Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing 2014
DOI: 10.1145/2611462.2611481
|View full text |Cite
|
Sign up to set email alerts
|

Distributed computing building blocks for rational agents

Abstract: Following [4] we extend and generalize the game-theoretic model of distributed computing, identifying different utility functions that encompass different potential preferences of players in a distributed system. A good distributed algorithm in the game-theoretic context is one that prohibits the agents (processors with interests) from deviating from the protocol; any deviation would result in the agent losing, i.e., reducing its utility at the end of the algorithm. We distinguish between different utility fun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
95
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(95 citation statements)
references
References 34 publications
(41 reference statements)
0
95
0
Order By: Relevance
“…1 Code for a normal processor i: 2 Initially,d i,i := d i 3 for j = 1 to n do 4 Wait to receive a data messaged i,i−j (mod n) and then send the previous data messagê d i,i−j+1 (mod n) . 5 if j = i then 6 wait for an incoming validation messagev i,j and forward it immediately. perform validation by sending v i and waiting to receive it.…”
Section: Proof Outlinementioning
confidence: 99%
See 3 more Smart Citations
“…1 Code for a normal processor i: 2 Initially,d i,i := d i 3 for j = 1 to n do 4 Wait to receive a data messaged i,i−j (mod n) and then send the previous data messagê d i,i−j+1 (mod n) . 5 if j = i then 6 wait for an incoming validation messagev i,j and forward it immediately. perform validation by sending v i and waiting to receive it.…”
Section: Proof Outlinementioning
confidence: 99%
“…In our model, we assume that the set of ids is known to all the processors prior to the execution of the protocol, however originally in [4,5] the ids are not given, but learned during the execution of the protocol. Their protocol includes a preceding wake-up phase, where processors exchange ids and agree upon a direction for the ring.…”
Section: H When the Ids Are Not Known Aheadmentioning
confidence: 99%
See 2 more Smart Citations
“…Perhaps, this framework has been investigated for the first time in [13], where rational behaviour is analyzed in secret-sharing problems and multiparty computations. More recently, the impact of rational adversaries has been investigated on fundamental tasks in Distributed Computing such as leader election, consensus, and wake-up problems [2,3,12,14].…”
Section: Introductionmentioning
confidence: 99%