{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T14:39:06Z","timestamp":1759847946956,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T00:00:00Z","timestamp":1548374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2019,1,25]]},"abstract":"<jats:p>We model the competition over several blockchains characterizing multiple cryptocurrencies as a non-cooperative game. Then, we specialize our results to two instances of the general game, showing properties of the Nash equilibrium. In particular, leveraging results about congestion games, we establish the existence of pure Nash equilibria and provide efficient algorithms for finding such equilibria.<\/jats:p>","DOI":"10.1145\/3308897.3308950","type":"journal-article","created":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T14:01:39Z","timestamp":1548684099000},"page":"114-117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Mining competition in a multi-cryptocurrency ecosystem at the network edge"],"prefix":"10.1145","volume":"46","author":[{"given":"Eitan","family":"Altman","sequence":"first","affiliation":[{"name":"INRIA and Bell Labs Joint Lab, France"}]},{"given":"Alexandre","family":"Reiffers","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Daniel S.","family":"Menasche","sequence":"additional","affiliation":[{"name":"UFRJ, Rio de Janeiro, Brazil"}]},{"given":"Mandar","family":"Datar","sequence":"additional","affiliation":[{"name":"INRIA and Bell Labs Joint Lab, France"}]},{"given":"Swapnil","family":"Dhamal","sequence":"additional","affiliation":[{"name":"INRIA, France"}]},{"given":"Corinne","family":"Touati","sequence":"additional","affiliation":[{"name":"INRIA, France"}]}],"member":"320","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.5195\/LEDGER.2017.96"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_2_1_3_1","volume-title":"Theory and Applications of Crypto Techniques","author":"Garay J.","year":"2015","unstructured":"Garay , J. , Kiayias , A. , and Leonardos , N . The bitcoin backbone protocol . In Theory and Applications of Crypto Techniques ( 2015 ), Springer . Garay, J., Kiayias, A., and Leonardos, N. The bitcoin backbone protocol. In Theory and Applications of Crypto Techniques (2015), Springer."},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1287\/opre.45.6.966"},{"key":"e_1_2_1_5_1","volume-title":"Monopoly without a monopolist. SSRN","author":"Huberman G.","year":"2017","unstructured":"Huberman , G. , Leshno , J. D. , and Moallemi , C. C . Monopoly without a monopolist. SSRN ( 2017 ). Huberman, G., Leshno, J. D., and Moallemi, C. C. Monopoly without a monopolist. SSRN (2017)."},{"key":"e_1_2_1_6_1","volume-title":"Allerton","author":"Johari R.","year":"2003","unstructured":"Johari , R. , and Tsitsiklis , J. N . Network resource allocation and a congestion game . In Allerton ( 2003 ). Johari, R., and Tsitsiklis, J. N. Network resource allocation and a congestion game. In Allerton (2003)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1145\/2940716.2940773"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1007\/978-3-642-25280-8_8"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1007\/978-3-319-67816-0_25"},{"key":"e_1_2_1_10_1","volume-title":"Congestion games with player-speci c payo functions. Games and economic behavior 13, 1","author":"Milchtaich I.","year":"1996","unstructured":"Milchtaich , I. Congestion games with player-speci c payo functions. Games and economic behavior 13, 1 ( 1996 ), 111{124. Milchtaich, I. Congestion games with player-speci c payo functions. Games and economic behavior 13, 1 (1996), 111{124."},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1007\/s001820050086"},{"key":"e_1_2_1_12_1","volume-title":"Potential games. Games and economic behavior 14, 1","author":"Monderer D.","year":"1996","unstructured":"Monderer , D. , and Shapley , L. S . Potential games. Games and economic behavior 14, 1 ( 1996 ), 124{143. Monderer, D., and Shapley, L. S. Potential games. Games and economic behavior 14, 1 (1996), 124{143."},{"key":"e_1_2_1_13_1","volume-title":"Ethereum Price Prediction","author":"Raval S.","year":"2018","unstructured":"Raval , S. Ethereum Price Prediction , 2018 . https:\/\/tinyurl.com\/ethereumpred. Raval, S. Ethereum Price Prediction, 2018. https:\/\/tinyurl.com\/ethereumpred."},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1007\/BF01737559"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1109\/ALLERTON.2014.7028484"},{"key":"e_1_2_1_16_1","volume-title":"Game of coins. arXiv:1805.08979","author":"Spiegelman A.","year":"2018","unstructured":"Spiegelman , A. , Keidar , I. , and Tennenholtz , M . Game of coins. arXiv:1805.08979 ( 2018 ). Spiegelman, A., Keidar, I., and Tennenholtz, M. Game of coins. arXiv:1805.08979 (2018)."},{"unstructured":"Ulrich F. Attacking Bitcoin 2017. https:\/\/tinyurl.com\/fulrich.  Ulrich F. Attacking Bitcoin 2017. https:\/\/tinyurl.com\/fulrich.","key":"e_1_2_1_17_1"},{"unstructured":"Wisdom B. Bitcoin Difficulty 2018. https:\/\/bitcoinwisdom.com\/bitcoin\/difficulty.  Wisdom B. Bitcoin Difficulty 2018. https:\/\/bitcoinwisdom.com\/bitcoin\/difficulty.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","volume-title":"Edge computing resource management and pricing for mobile blockchain. arXiv:1710.01567","author":"Xiong Z.","year":"2017","unstructured":"Xiong , Z. , Feng , S. , Niyato , D. , and Wang , P . Edge computing resource management and pricing for mobile blockchain. arXiv:1710.01567 ( 2017 ). Xiong, Z., Feng, S., Niyato, D., and Wang, P. Edge computing resource management and pricing for mobile blockchain. arXiv:1710.01567 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.1007\/s11265-015-1038-9"}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308897.3308950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308897.3308950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:03Z","timestamp":1750208283000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308897.3308950"}},"subtitle":["a congestion game approach"],"short-title":[],"issued":{"date-parts":[[2019,1,25]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,1,25]]}},"alternative-id":["10.1145\/3308897.3308950"],"URL":"https:\/\/doi.org\/10.1145\/3308897.3308950","relation":{},"ISSN":["0163-5999"],"issn-type":[{"type":"print","value":"0163-5999"}],"subject":[],"published":{"date-parts":[[2019,1,25]]},"assertion":[{"value":"2019-01-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}