{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:28Z","timestamp":1761401788277,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T00:00:00Z","timestamp":1441411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004147","name":"Tsinghua University (CN)","doi-asserted-by":"publisher","award":["the National Basic Re- search Program of China Grant 2011CBA00300, 2011CBA00301, the National Natural Science Foundation of China Grant 61033001, 61361136003"],"award-info":[{"award-number":["the National Basic Re- search Program of China Grant 2011CBA00300, 2011CBA00301, the National Natural Science Foundation of China Grant 61033001, 61361136003"]}],"id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s00446-015-0250-y","type":"journal-article","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T00:05:17Z","timestamp":1441411517000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Fair and resilient Incentive Tree mechanisms"],"prefix":"10.1007","volume":"29","author":[{"given":"Yuezhou","family":"Lv","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Moscibroda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,5]]},"reference":[{"key":"250_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, A., Huttenlocher, D., Kleinberg, J., Leskovec, J.: Steering user behavior with badges. In: Proceedings of the 22nd International Conference on World Wide Web (WWW), pp. 95\u2013106. ACM (2013)","DOI":"10.1145\/2488388.2488398"},{"key":"250_CR2","doi-asserted-by":"crossref","unstructured":"Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC), pp. 56\u201373. ACM (2012)","DOI":"10.1145\/2229012.2229022"},{"key":"250_CR3","doi-asserted-by":"crossref","unstructured":"Cebrian, M., Coviello, L., Vattani, A., Voulgaris, P.: Finding red balloons with split contracts: robustness to individuals\u2019 selfishness. In: Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC), pp. 775\u2013788. ACM (2012)","DOI":"10.1145\/2213977.2214047"},{"key":"250_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yu, D., Zhang, L.: Sybil-proof mechanisms in query incentive networks. In: Proceedings of the 14th ACM Conference on Electronic Commerce (EC), pp. 197\u2013214. ACM (2013)","DOI":"10.1145\/2492002.2482588"},{"key":"250_CR5","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57\u201366. ACM (2001)","DOI":"10.1145\/502512.502525"},{"key":"250_CR6","doi-asserted-by":"crossref","unstructured":"Douceur, JR: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) Peer-to-Peer Systems, pp. 251\u2013260. Springer (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"250_CR7","doi-asserted-by":"crossref","unstructured":"Douceur, J.R., Moscibroda, T.: Lottery trees: motivational deployment of networked systems. In: Proceedings of SIGCOMM, pp. 121\u2013132. ACM (2007)","DOI":"10.1145\/1282380.1282395"},{"key":"250_CR8","doi-asserted-by":"crossref","unstructured":"Drucker, F.A., Fleischer, L.K.: Simpler sybil-proof mechanisms for multi-level marketing. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC), pp. 441\u2013458. ACM (2012)","DOI":"10.1145\/2229012.2229046"},{"key":"250_CR9","doi-asserted-by":"crossref","unstructured":"Emek, Y., Karidi, R., Tennenholtz, M., Zohar, A.: Mechanisms for multi-level marketing. In: Proceedings of the 12th ACM Conference on Electronic Commerce (EC), pp. 209\u2013218. ACM (2011)","DOI":"10.1145\/1993574.1993606"},{"key":"250_CR10","doi-asserted-by":"crossref","unstructured":"Ghosh, A., McAfee, P.: Incentivizing high-quality user-generated content. In: Proceedings of the 20th International Conference on World Wide Web (WWW), pp. 137\u2013146. ACM (2011)","DOI":"10.1145\/1963405.1963428"},{"key":"250_CR11","doi-asserted-by":"crossref","unstructured":"Kleinberg, J., Raghavan, P.: Query incentive networks. In: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 132\u2013141. IEEE (2005)","DOI":"10.1109\/SFCS.2005.63"},{"key":"250_CR12","doi-asserted-by":"crossref","unstructured":"Lv, Y., Moscibroda, T.: Fair and resilient incentive tree mechanisms. In: Proceedings of the 32nd Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 230\u2013239. ACM (2013)","DOI":"10.1145\/2484239.2484252"},{"issue":"6055","key":"250_CR13","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.1205869","volume":"334","author":"G Pickard","year":"2011","unstructured":"Pickard, G., Pan, W., Rahwan, I., Cebrian, M., Crane, R., Madan, A., Pentland, A.: Time-critical social mobilization. Science 334(6055), 509\u2013512 (2011)","journal-title":"Science"},{"key":"250_CR14","doi-asserted-by":"crossref","unstructured":"Rai, A., Chintalapudi, K.K., Padmanabhan, V.N., Sen, R.: Zee: zero-effort crowdsourcing for indoor localization. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 293\u2013304. ACM (2012)","DOI":"10.1145\/2348543.2348580"},{"issue":"4","key":"250_CR15","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/BF00132312","volume":"2","author":"M Tennenholtz","year":"1996","unstructured":"Tennenholtz, M.: Convention evolution in organizations and markets. Comput. Math. Organ. Theory 2(4), 261\u2013283 (1996)","journal-title":"Comput. Math. Organ. Theory"},{"key":"250_CR16","doi-asserted-by":"crossref","unstructured":"Wagman, L., Conitzer, V.: Optimal false-name-proof voting rules with costly voting. In: AAAI, pp. 190\u2013195 (2008)","DOI":"10.1007\/978-3-540-92185-1_36"},{"key":"250_CR17","doi-asserted-by":"crossref","unstructured":"Wang, H., Sen, S., Elgohary, A., Farid, M., Youssef, M., Choudhury, R.R.: No need to war-drive: unsupervised indoor localization. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 197\u2013210. ACM (2012)","DOI":"10.1145\/2307636.2307655"},{"key":"250_CR18","doi-asserted-by":"crossref","unstructured":"Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 173\u2013184. ACM (2012)","DOI":"10.1145\/2348543.2348567"}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-015-0250-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00446-015-0250-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-015-0250-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T02:22:22Z","timestamp":1567131742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00446-015-0250-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,5]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["250"],"URL":"https:\/\/doi.org\/10.1007\/s00446-015-0250-y","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"type":"print","value":"0178-2770"},{"type":"electronic","value":"1432-0452"}],"subject":[],"published":{"date-parts":[[2015,9,5]]}}}