{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:51:24Z","timestamp":1761598284118,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3423211.3425678","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T23:03:11Z","timestamp":1607727791000},"page":"74-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MATCH"],"prefix":"10.1145","author":[{"given":"Martijn","family":"de Vos","sequence":"first","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Georgy","family":"Ishmaev","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Johan","family":"Pouwelse","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"volume-title":"International Conference on Architecture of Computing Systems. Springer, 174--186","author":"Tariq","key":"e_1_3_2_1_1_1","unstructured":"Tariq Abdullah et al. 2010. Effect of the degree of neighborhood on resource discovery in ad hoc grids . In International Conference on Architecture of Computing Systems. Springer, 174--186 . Tariq Abdullah et al. 2010. Effect of the degree of neighborhood on resource discovery in ad hoc grids. In International Conference on Architecture of Computing Systems. Springer, 174--186."},{"volume-title":"2008 International Conference on Computer Engineering & Systems. IEEE, 364--371","author":"Abdulrahman","key":"e_1_3_2_1_2_1","unstructured":"Abdulrahman A Azab et al. 2008. An adaptive decentralized scheduling mechanism for peer-to-peer desktop grids . In 2008 International Conference on Computer Engineering & Systems. IEEE, 364--371 . Abdulrahman A Azab et al. 2008. An adaptive decentralized scheduling mechanism for peer-to-peer desktop grids. In 2008 International Conference on Computer Engineering & Systems. IEEE, 364--371."},{"key":"e_1_3_2_1_3_1","volume-title":"Matching markets in the digital age. Science 352, 6289","author":"Azevedo Eduardo M.","year":"2016","unstructured":"Eduardo M. Azevedo and E. Glen Weyl . 2016. Matching markets in the digital age. Science 352, 6289 ( 2016 ), 1056--1057. Eduardo M. Azevedo and E. Glen Weyl. 2016. Matching markets in the digital age. Science 352, 6289 (2016), 1056--1057."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.127"},{"volume-title":"Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No. 99CB37003)","author":"Guruduth","key":"e_1_3_2_1_5_1","unstructured":"Guruduth Banavar et al. 1999. An efficient multicast protocol for content-based publish-subscribe systems . In Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No. 99CB37003) . IEEE, 262--272. Guruduth Banavar et al. 1999. An efficient multicast protocol for content-based publish-subscribe systems. In Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No. 99CB37003). IEEE, 262--272."},{"volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1521--1538","author":"Iddo","key":"e_1_3_2_1_6_1","unstructured":"Iddo Bentov et al. 2019. Tesseract: Real-time cryptocurrency exchange using trusted hardware . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1521--1538 . Iddo Bentov et al. 2019. Tesseract: Real-time cryptocurrency exchange using trusted hardware. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1521--1538."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-63171-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.690"},{"key":"e_1_3_2_1_9_1","first-page":"1623","article-title":"The taking economy: Uber, information, and power","volume":"117","author":"Calo Ryan","year":"2017","unstructured":"Ryan Calo and Alex Rosenblat . 2017 . The taking economy: Uber, information, and power . Colum. L. Rev. 117 (2017), 1623 . Ryan Calo and Alex Rosenblat. 2017. The taking economy: Uber, information, and power. Colum. L. Rev. 117 (2017), 1623.","journal-title":"Colum. L. Rev."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE INFOCOM","volume":"2","author":"Antonio","year":"2004","unstructured":"Antonio Carzaniga et al. 2004. A routing scheme for content-based networking . In IEEE INFOCOM 2004 , Vol. 2 . IEEE, 918--928. Antonio Carzaniga et al. 2004. A routing scheme for content-based networking. In IEEE INFOCOM 2004, Vol. 2. IEEE, 918--928."},{"key":"e_1_3_2_1_12_1","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro , Barbara Liskov , 1999 . Practical Byzantine fault tolerance . In OSDI , Vol. 99. 173 -- 186 . Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In OSDI, Vol. 99. 173--186.","journal-title":"OSDI"},{"volume-title":"Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. 407--418","author":"Yatin","key":"e_1_3_2_1_13_1","unstructured":"Yatin Chawathe et al. 2003. Making gnutella-like p2p systems scalable . In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. 407--418 . Yatin Chawathe et al. 2003. Making gnutella-like p2p systems scalable. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. 407--418."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/0010414019852687"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Karl Czajkowski et al. 1998. A resource management architecture for metacomputing systems. In JSSPP. Springer 62--82.  Karl Czajkowski et al. 1998. A resource management architecture for metacomputing systems. In JSSPP. Springer 62--82.","DOI":"10.1007\/BFb0053981"},{"key":"e_1_3_2_1_16_1","unstructured":"Philip Daian et al. 2019. Flash Boys 2.0: Frontrunning Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv e-prints (2019). arXiv:1904.05234  Philip Daian et al. 2019. Flash Boys 2.0: Frontrunning Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv e-prints (2019). arXiv:1904.05234"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250581"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_19_1","volume-title":"Matchmaking within multi-agent systems. Proceeding of ProRisc-2004","author":"Ebrahimi B Pour","year":"2004","unstructured":"B Pour Ebrahimi , K Bertels , S Vassiliadis , and K Sigdel . 2004. Matchmaking within multi-agent systems. Proceeding of ProRisc-2004 ( 2004 ). B Pour Ebrahimi, K Bertels, S Vassiliadis, and K Sigdel. 2004. Matchmaking within multi-agent systems. Proceeding of ProRisc-2004 (2004)."},{"volume-title":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference. 7--8.","author":"Janick","key":"e_1_3_2_1_20_1","unstructured":"Janick Edinger et al. 2016. Decentralized scheduling for tasklets . In Proceedings of the Posters and Demos Session of the 17th International Middleware Conference. 7--8. Janick Edinger et al. 2016. Decentralized scheduling for tasklets. In Proceedings of the Posters and Demos Session of the 17th International Middleware Conference. 7--8."},{"key":"e_1_3_2_1_21_1","unstructured":"Shayan Eskandari et al. 2019. SoK: Transparent Dishonesty: front-running attacks on Blockchain. CoRR abs\/1902.05164 (2019).  Shayan Eskandari et al. 2019. SoK: Transparent Dishonesty: front-running attacks on Blockchain. CoRR abs\/1902.05164 (2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015617019423"},{"volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Galal Hisham S","key":"e_1_3_2_1_23_1","unstructured":"Hisham S Galal and Amr M Youssef . 2018. Succinctly verifiable sealed-bid auction smart contract . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 3--19. Hisham S Galal and Amr M Youssef. 2018. Succinctly verifiable sealed-bid auction smart contract. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 3--19."},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 265--278","author":"Galal Hisham S","year":"2018","unstructured":"Hisham S Galal and Amr M Youssef . 2018 . Verifiable sealed-bid auction on the ethereum blockchain . In International Conference on Financial Cryptography and Data Security. Springer, 265--278 . Hisham S Galal and Amr M Youssef. 2018. Verifiable sealed-bid auction on the ethereum blockchain. In International Conference on Financial Cryptography and Data Security. Springer, 265--278."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_26_1","unstructured":"Jacek Gomoluch et al. 2003. Market-based Resource Allocation for Grid Computing: A Model and Simulation.. In Middleware. 211--218.  Jacek Gomoluch et al. 2003. Market-based Resource Allocation for Grid Computing: A Model and Simulation.. In Middleware. 211--218."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Aniko Hannak et al. 2014. Measuring Price Discrimination and Steering on E-Commerce Web Sites. In ICM. 305--318.  Aniko Hannak et al. 2014. Measuring Price Discrimination and Steering on E-Commerce Web Sites. In ICM. 305--318.","DOI":"10.1145\/2663716.2663744"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2005.1440807"},{"key":"e_1_3_2_1_29_1","volume-title":"Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR 2019","author":"Aljosha","year":"2019","unstructured":"Aljosha Judmayer et al. 2019 . Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR 2019 ( 2019 ), 775. Aljosha Judmayer et al. 2019. Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR 2019 (2019), 775."},{"key":"e_1_3_2_1_30_1","unstructured":"Aashish Kolluri et al. 2018. Exploiting The Laws of Order in Smart Contracts. CoRR abs\/1810.11605 (2018).  Aashish Kolluri et al. 2018. Exploiting The Laws of Order in Smart Contracts. CoRR abs\/1810.11605 (2018)."},{"key":"e_1_3_2_1_31_1","volume-title":"Aurora: A Decentralized Financial Institution Utilizing Distributed Computing and the Ethereum Network.","author":"Labs Aurora","year":"2018","unstructured":"Aurora Labs . 2018 . Aurora: A Decentralized Financial Institution Utilizing Distributed Computing and the Ethereum Network. Aurora Labs. 2018. Aurora: A Decentralized Financial Institution Utilizing Distributed Computing and the Ethereum Network."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Simone A Ludwig etal 2012. Matchmaking in multi-attribute auctions using a genetic algorithm and a particle swarm approach. In New Trends in Agent-Based Complex Automated Negotiations. 81--98.  Simone A Ludwig et al. 2012. Matchmaking in multi-attribute auctions using a genetic algorithm and a particle swarm approach. In New Trends in Agent-Based Complex Automated Negotiations. 81--98.","DOI":"10.1007\/978-3-642-24696-8_5"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668893"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355468"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_3_2_1_37_1","volume-title":"Swap: A Peer-to-Peer Protocol for Trading Ethereum Tokens. https:\/\/swap.tech\/whitepaper\/","author":"Michael Oved","year":"2017","unstructured":"Oved Michael and Mosites Don . 2017 . Swap: A Peer-to-Peer Protocol for Trading Ethereum Tokens. https:\/\/swap.tech\/whitepaper\/ Oved Michael and Mosites Don. 2017. Swap: A Peer-to-Peer Protocol for Trading Ethereum Tokens. https:\/\/swap.tech\/whitepaper\/"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15277-1_40"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"#cr-split#-e_1_3_2_1_40_1.1","doi-asserted-by":"crossref","unstructured":"OECD. 2019. An Introduction to Online Platforms and Their Role in the Digital Transformation. 216 pages. https:\/\/doi.org\/10.1787\/53e5f593-en 10.1787\/53e5f593-en","DOI":"10.1787\/53e5f593-en"},{"key":"#cr-split#-e_1_3_2_1_40_1.2","doi-asserted-by":"crossref","unstructured":"OECD. 2019. An Introduction to Online Platforms and Their Role in the Digital Transformation. 216 pages. https:\/\/doi.org\/10.1787\/53e5f593-en","DOI":"10.1787\/53e5f593-en"},{"key":"e_1_3_2_1_41_1","volume-title":"Oride: A privacy-preserving yet accountable ride-hailing service. In USENIX Security. 1235--1252.","author":"Anh Pham","year":"2017","unstructured":"Anh Pham et al. 2017 . Oride: A privacy-preserving yet accountable ride-hailing service. In USENIX Security. 1235--1252. Anh Pham et al. 2017. Oride: A privacy-preserving yet accountable ride-hailing service. In USENIX Security. 1235--1252."},{"volume-title":"Proceedings of The 7th International Symposium on High Performance Distributed Computing. IEEE, 140--146","author":"Rajesh","key":"e_1_3_2_1_43_1","unstructured":"Rajesh Raman et al. 1998. Matchmaking: Distributed resource management for high throughput computing . In Proceedings of The 7th International Symposium on High Performance Distributed Computing. IEEE, 140--146 . Rajesh Raman et al. 1998. Matchmaking: Distributed resource management for high throughput computing. In Proceedings of The 7th International Symposium on High Performance Distributed Computing. IEEE, 140--146."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.22381\/JSME4320161"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.3390\/info11020090"},{"key":"e_1_3_2_1_46_1","unstructured":"Fabian Schuh and Daniel Larimer. 2017. Bitshares 2.0: general overview. htp:\/\/docs.bitshares.org\/downloads\/bitshares-general.pdf  Fabian Schuh and Daniel Larimer. 2017. Bitshares 2.0: general overview. htp:\/\/docs.bitshares.org\/downloads\/bitshares-general.pdf"},{"volume-title":"Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 3. International Foundation for Autonomous Agents and Multiagent Systems, 1437--1440","author":"Victor","key":"e_1_3_2_1_47_1","unstructured":"Victor Shafran et al. 2008. Towards bidirectional distributed matchmaking . In Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 3. International Foundation for Autonomous Agents and Multiagent Systems, 1437--1440 . Victor Shafran et al. 2008. Towards bidirectional distributed matchmaking. In Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 3. International Foundation for Autonomous Agents and Multiagent Systems, 1437--1440."},{"key":"e_1_3_2_1_48_1","unstructured":"K Sigdel et al. 2005. A framework for adaptive matchmaking in distributed computing. In In proceeding of GRID Workshop Vol. 224.  K Sigdel et al. 2005. A framework for adaptive matchmaking in distributed computing. In In proceeding of GRID Workshop Vol. 224."},{"key":"e_1_3_2_1_49_1","volume-title":"A Truly Self-Sovereign Identity System. arXiv preprint arXiv:2007.00415","author":"Stokkink Quinten","year":"2020","unstructured":"Quinten Stokkink , Dick Epema , and Johan Pouwelse . 2020. A Truly Self-Sovereign Identity System. arXiv preprint arXiv:2007.00415 ( 2020 ). Quinten Stokkink, Dick Epema, and Johan Pouwelse. 2020. A Truly Self-Sovereign Identity System. arXiv preprint arXiv:2007.00415 (2020)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158333"},{"key":"e_1_3_2_1_51_1","unstructured":"N TLC. 2017. Nyc taxi and limousine commission (tlc) trip record data.  N TLC. 2017. Nyc taxi and limousine commission (tlc) trip record data."},{"volume-title":"Proceedings of the 11th international conference on World Wide Web. 89--98","author":"David","key":"e_1_3_2_1_52_1","unstructured":"David Trastour et al. 2002. Semantic web support for the business-to-business e-commerce lifecycle . In Proceedings of the 11th international conference on World Wide Web. 89--98 . David Trastour et al. 2002. Semantic web support for the business-to-business e-commerce lifecycle. In Proceedings of the 11th international conference on World Wide Web. 89--98."},{"volume-title":"Matchmaking in electronic markets: An agent-based approach towards matchmaking in electronic negotiations","author":"Veit Daniel J","key":"e_1_3_2_1_53_1","unstructured":"Daniel J Veit . 2003. Matchmaking in electronic markets: An agent-based approach towards matchmaking in electronic negotiations . Vol. 2882 . Springer . Daniel J Veit. 2003. Matchmaking in electronic markets: An agent-based approach towards matchmaking in electronic negotiations. Vol. 2882. Springer."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839510290030525"},{"key":"e_1_3_2_1_55_1","volume-title":"International Workshop on Open Problems in Network Security. Springer, 112--125","author":"Vukoli\u0107 Marko","year":"2015","unstructured":"Marko Vukoli\u0107 . 2015 . The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication . In International Workshop on Open Problems in Network Security. Springer, 112--125 . Marko Vukoli\u0107. 2015. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In International Workshop on Open Problems in Network Security. Springer, 112--125."},{"key":"e_1_3_2_1_56_1","volume-title":"Loopring: A decentralized token exchange protocol.","author":"Daniel Wang","year":"2018","unstructured":"Daniel Wang et al. 2018 . Loopring: A decentralized token exchange protocol. (2018). https:\/\/github.com\/Loopring\/whitepaper\/blob\/master\/en_whitepaper.pdf Daniel Wang et al. 2018. Loopring: A decentralized token exchange protocol. (2018). https:\/\/github.com\/Loopring\/whitepaper\/blob\/master\/en_whitepaper.pdf"},{"key":"e_1_3_2_1_57_1","unstructured":"Will Warren and Amir Bandeali. 2017. 0x: An open protocol for decentralized exchange on the Ethereum blockchain. https:\/\/github.com\/0xProject\/whitepaper  Will Warren and Amir Bandeali. 2017. 0x: An open protocol for decentralized exchange on the Ethereum blockchain. https:\/\/github.com\/0xProject\/whitepaper"},{"key":"e_1_3_2_1_58_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 , 2014 (2014), 1--32. Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_59_1","first-page":"724","article-title":"Network latency estimation for personal devices: A matrix completion approach","volume":"25","author":"Rui Zhu","year":"2016","unstructured":"Rui Zhu et al. 2016 . Network latency estimation for personal devices: A matrix completion approach . IEEE\/ACM Transactions on Networking 25 , 2 (2016), 724 -- 737 . Rui Zhu et al. 2016. Network latency estimation for personal devices: A matrix completion approach. IEEE\/ACM Transactions on Networking 25, 2 (2016), 724--737.","journal-title":"IEEE\/ACM Transactions on Networking"}],"event":{"name":"Middleware '20: 21st International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP"],"location":"Delft Netherlands","acronym":"Middleware '20"},"container-title":["Proceedings of the 21st International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423211.3425678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3423211.3425678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:57Z","timestamp":1750195497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423211.3425678"}},"subtitle":["A Decentralized Middleware for Fair Matchmaking In Peer-to-Peer Markets"],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":59,"alternative-id":["10.1145\/3423211.3425678","10.1145\/3423211"],"URL":"https:\/\/doi.org\/10.1145\/3423211.3425678","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}