Home

My bibliography on Zotero:

Beehner, L. (2014). In Hot Pursuit of ISIS. Froreign Affairs.
Cyranoski, D. (2014). World’s oldest art found in Indonesian cave. Nature. doi:10.1038/nature.2014.16100
DemocracyOS. (n.d.). Retrieved October 10, 2014, from http://democracyos.org/
Veronese, K. (n.d.). The first artificial sweetener poisoned lots of Romans. Retrieved October 9, 2014, from http://io9.com/5877587/the-first-artificial-sweetener-poisoned-lots-of-romans
Killgrove, K. (n.d.). Lead Poisoning in Rome - The Skeletal Evidence. Retrieved October 9, 2014, from http://www.poweredbyosteons.org/2012/01/lead-poisoning-in-rome-skeletal.html
KOEBLER, J. (n.d.). Outsourced Jobs Are No Longer Cheap, So They’re Being Automated. Retrieved October 9, 2014, from http://motherboard.vice.com/read/outsourcing-is-no-longer-cheap-so-its-being-automated
Tommy v Lavery.
Gannon, M. (n.d.). Court Could Decide If Chimpanzees Are Legal Persons. Retrieved October 9, 2014, from http://www.livescience.com/48166-chimpanzee-personhood-case-appeal.html?cmpid=514627_20141008_33056186
Automatizing rewards for solving hard problems with Bitcoin. (n.d.). Retrieved October 8, 2014, from http://blogchain.fr/programmarket-en/
Proof Market. (n.d.). Retrieved October 8, 2014, from https://proofmarket.org/
Konnikova, M. (2014 10–7). The Limits of Friendship. The New Yorker. Retrieved October 7, 2014, from http://www.newyorker.com/science/maria-konnikova/social-media-affect-math-dunbar-number-friendships
Whiten, A. (n.d.). Machiavellian Intelligence Hypothesis. Retrieved October 7, 2014, from http://ai.ato.ms/MITECS/Entry/whiten.html
credlib - Credential Library. (n.d.). Retrieved October 7, 2014, from http://www.cypherspace.org/credlib/
Autor, D. (2014). Polanyi’s Paradox and the Shape of Employment Growth. Federal Reserve Bank of Kansas City.
Wisdom in the Age of Information. (2014). Retrieved from https://www.youtube.com/watch?v=bjoO6Y29f7I&feature=youtube_gdata_player
Poll - Voting done simply in real-times. (n.d.). Retrieved October 5, 2014, from http://poll.lab.io/
Bendahan, S., Zehnder, C., Pralong, F. P., & Antonakis, J. (2014). Leader corruption depends on power and testosterone. The Leadership Quarterly. doi:10.1016/j.leaqua.2014.07.010
Sposi, M., & Grossman, V. (2014). Deindustrialization Redeploys Workers to Growing Service Sector.
Pole, S. (n.d.). We are more rational than those who nudge us. Retrieved October 4, 2014, from http://aeon.co/magazine/psychology/we-are-more-rational-than-those-who-nudge-us/
HOUSE OF LORDS Science and Technology Select Committee. (n.d.). Behaviour Change.
The privileged few: To those that have shall be given. (n.d.). Retrieved October 4, 2014, from http://www.economist.com/news/special-report/21621160-labour-steadily-losing-out-capital-those-have-shall-be-given
Ságvári, B. (n.d.). What is American identity to you personally? Retrieved October 4, 2014, from https://www.facebook.com/photo.php?fbid=10152808234728385&set=a.461291493384.231579.569948384&type=1&theater
Pruitt, J. N., & Goodnight, C. J. (2014). Site-specific group selection drives locally adapted group compositions. Nature. doi:10.1038/nature13811
Bloom, P. (n.d.). Against Empathy. Retrieved October 2, 2014, from http://bostonreview.net/forum/paul-bloom-against-empathy
Ghost Gunner. (n.d.). Retrieved October 2, 2014, from https://ghostgunner.net/
Merriman, B. (n.d.). Piracy at the Old Bailey. Retrieved October 2, 2014, from http://publicdomainreview.org/2014/10/01/piracy-at-the-old-bailey/
Wagman, L., & Conitzer, V. (2008). Optimal False-Name-Proof Voting Rules with Costly Voting. In AAAI (pp. 190–195).
elmultnegyev. (n.d.). Retrieved October 2, 2014, from https://sites.google.com/site/elmultnegyev/
Least Authority. (n.d.). Retrieved October 2, 2014, from https://leastauthority.com/how_it_works
Terms of Service; Didn’t Read. (n.d.). Retrieved October 1, 2014, from https://tosdr.org/
Why stop at Isis when we could bomb the whole Muslim world? | George Monbiot | Comment is free | The Guardian. (n.d.). Retrieved October 1, 2014, from http://www.theguardian.com/commentisfree/2014/sep/30/isis-bomb-muslim-world-air-strikes-saudi-arabia
Buterin, V. (n.d.). An Introduction to Futarchy. Retrieved October 1, 2014, from https://blog.ethereum.org/2014/08/21/introduction-futarchy/
Assembly Coins. (n.d.). Retrieved October 1, 2014, from https://coins.assembly.com/
A Fidesz magára szabta a budapesti választásokat is. (n.d.). Retrieved September 30, 2014, from http://tenytar.blog.hu/2014/06/11/a_fidesz_magara_szabta_a_budapesti_valasztasokat_is
Mann, R. P., & Garnett, R. (2014). The entropic basis of collective behaviour. arXiv Preprint arXiv:1409.6895.
Hőbl, K., Bleier, J., & Salamon, E. E. dr. (n.d.). Fővárosi Ítélőtábla az EvoBank fellebbezése alapján, „devizaperben” folytatott másodfokú  eljárásban, az alábbi határozatot hirdette ki.
THIEL, P. (n.d.). You Should Run Your Startup Like a Cult. Here’s How. Retrieved September 29, 2014, from http://www.wired.com/2014/09/run-startup-like-cult-heres/
Microsoft Prediction Lab. (n.d.). Retrieved September 29, 2014, from https://prediction.microsoft.com/#!/
snitko/straight-server. (n.d.). GitHub. Retrieved September 28, 2014, from https://github.com/snitko/straight-server
Salehi-Abari, A., & Boutilier, C. (2014). Empathetic social choice on social networks. In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems (pp. 693–700). International Foundation for Autonomous Agents and Multiagent Systems.
Kamkar, S. (n.d.). samyk/evercookie. GitHub. Retrieved September 27, 2014, from https://github.com/samyk/evercookie
Janc, A., & Zalewski, M. (n.d.). Technical analysis of client identification mechanisms. Retrieved September 27, 2014, from http://www.chromium.org/Home/chromium-security/client-identification-mechanisms
KELLY, K. (n.d.). The Shirky Principle. Retrieved September 27, 2014, from http://kk.org/thetechnium/2010/04/the-shirky-prin/
De Keijzer, B. (2014). Externalities and Cooperation in Algorithmic Game Theory.
Ueda, S., Kitaki, M., Iwasaki, A., & Yokoo, M. (2011). Concise characteristic function representations in coalitional games based on agent types. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3 (pp. 1271–1272). International Foundation for Autonomous Agents and Multiagent Systems.
Rahwan, T., Michalak, T., Wooldridge, M., & Jennings, N. R. (2012). Anytime coalition structure generation in multi-agent systems with positive or negative externalities. Artificial Intelligence, 186, 95–122. doi:10.1016/j.artint.2012.03.007
Voice, T., Polukarov, M., & Jennings, N. R. (2014). Coalition structure generation over graphs. arXiv Preprint arXiv:1401.6428.
Hezarkhani, B., & Kubiak, W. (2010). Coordinating contracts in SCM: a review of methods and literature. Decision Making in Manufacturing and Services, 4(1-2), 5–28.
Aknine, S. (1999). A reliable algorithm for multi-agent coalition formation (pp. 290–295). IEEE. doi:10.1109/ISIC.1999.796670
Génin, T., & Aknine, S. (2008). Coalition Formation Strategies for Self-Interested Agents.
Aknine, S., Pinson, S., & Shakun, M. F. (2004). A Multi-Agent Coalition Formation Method Based on Preference Models. Group Decision and Negotiation, 13(6), 513–538. doi:10.1007/s10726-005-3074-5
Schneider, S. (2013). Phylobinary Trees. Retrieved September 23, 2014, from http://www.scott-a-s.com/phylobinary-trees/
Total Moving Face Reconstruction. (n.d.). Retrieved September 23, 2014, from http://grail.cs.washington.edu/projects/totalmoving/
Wilson, M. L., Boesch, C., Fruth, B., Furuichi, T., Gilby, I. C., Hashimoto, C., … Wrangham, R. W. (2014). Lethal aggression in Pan is better explained by adaptive strategies than human impacts. Nature, 513(7518), 414–417. doi:10.1038/nature13727
Spence, R. (n.d.). Who funds the arts and why we should care. Retrieved September 22, 2014, from http://www.ft.com/intl/cms/s/2/4313691c-3513-11e4-aa47-00144feabdc0.html#axzz3E0L7UxSX
Peel, Q. (n.d.). This No Vote Will Echo Throughout Europe. Retrieved September 22, 2014, from http://www.chathamhouse.org/expert/comment/15802
Wang, C., Li, Y., Xia, X., & Zheng, K. (2014). An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme. PLoS ONE, 9(9), e106925. doi:10.1371/journal.pone.0106925
STANLEY, T., & LEE, A. (n.d.). It’s Still Not the End of History. Retrieved September 21, 2014, from http://www.theatlantic.com/politics/archive/2014/09/its-still-not-the-end-of-history-francis-fukuyama/379394/?single_page=true

[...]
See more on Zotero.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong> <p>

This site is protected with Urban Giraffe's plugin 'HTML Purified' and Edward Z. Yang's Powered by HTML Purifier. 42912 items have been purified.