{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:33:03Z","timestamp":1759638783350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,1,8]],"date-time":"2012-01-08T00:00:00Z","timestamp":1325980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0729006CCF-0910940"],"award-info":[{"award-number":["CCF-0729006CCF-0910940"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-98-1-0589N00014-08-1-0031"],"award-info":[{"award-number":["N00014-98-1-0589N00014-08-1-0031"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,1,8]]},"DOI":"10.1145\/2090236.2090242","type":"proceedings-article","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T17:02:17Z","timestamp":1326214937000},"page":"60-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["The curse of simultaneity"],"prefix":"10.1145","author":[{"given":"Renato Paes","family":"Leme","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Vasilis","family":"Syrgkanis","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"\u00c9va","family":"Tardos","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2012,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1283383.1283404"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.68"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1689499.1689526"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1566374.1566416"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998549.1998553"},{"key":"e_1_3_2_1_6_1","first-page":"200","volume-title":"ICS","author":"Balcan M.-F.","year":"2010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378533.1378544"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070813"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79309-0_27"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250910.1250924"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007445"},{"volume-title":"MIT Press","year":"1991","author":"Fudenberg D.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.26"},{"volume-title":"Cambridge:MIT Press","year":"1988","author":"Harsanyi J.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"T. Hart and D. Edwards. The tree prune (tp) algorithm. Technical report M. I. T. Artificial Intelligence Project Memo # 30 1961.  T. Hart and D. Edwards. The tree prune (tp) algorithm. Technical report M. I. T. Artificial Intelligence Project Memo # 30 1961."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"P.-J. Herings and R. Peeters. Homotopy methods to compute equilibria in gametheory. Economic Theory 42(1) 2010.  P.-J. Herings and R. Peeters. Homotopy methods to compute equilibria in gametheory. Economic Theory 42(1) 2010.","DOI":"10.1007\/s00199-009-0441-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"D. Knuth and R. Moore. An analysis of alpha-beta pruning. Artificial Intelligence page 293\u00e2\u0102\u015e326 1975.  D. Knuth and R. Moore. An analysis of alpha-beta pruning. Artificial Intelligence page 293\u00e2\u0102\u015e326 1975.","DOI":"10.1016\/0004-3702(75)90019-3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1764891.1764944"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01585745"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1598780.1598791"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2095116.2095186"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"D. Parkes. Online Mechanisms. Algorithmic Game Theory (eds N. Nisan et al) 2007.  D. Parkes. Online Mechanisms. Algorithmic Game Theory (eds N. Nisan et al) 2007.","DOI":"10.1017\/CBO9780511800481.018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374428"},{"key":"e_1_3_2_1_24_1","first-page":"366","volume-title":"The Complexity of Equilibria in Cost Sharing Games. In WINE 2010: Proceedings of the 6th Workshop on Internet and Network Economics","author":"Syrgkanis V.","year":"2010"},{"volume-title":"Algorithmic Game Theory","year":"2007","author":"Vocking B.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01448847"},{"key":"e_1_3_2_1_27_1","first-page":"501","volume-title":"Fifth International Congress of Mathematicians","author":"Zermelo E. F. F.","year":"1913"}],"event":{"name":"ITCS '12: Innovations in Theoretical Computer Science","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Cambridge Massachusetts","acronym":"ITCS '12"},"container-title":["Proceedings of the 3rd Innovations in Theoretical Computer Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2090236.2090242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2090236.2090242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:45Z","timestamp":1750241205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2090236.2090242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,8]]},"references-count":27,"alternative-id":["10.1145\/2090236.2090242","10.1145\/2090236"],"URL":"https:\/\/doi.org\/10.1145\/2090236.2090242","relation":{},"subject":[],"published":{"date-parts":[[2012,1,8]]},"assertion":[{"value":"2012-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}