Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jamie Morgenstern is active.

Publication


Featured researches published by Jamie Morgenstern.


international conference on functional programming | 2010

Security-typed programming within dependently typed programming

Jamie Morgenstern; Daniel R. Licata

Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. In this paper, we show that security-typed programming can be embedded as a library within a general-purpose dependently typed programming language, Agda. Our library, Aglet, accounts for the major features of existing security-typed programming languages, such as decentralized access control, typed proof-carrying authorization, ephemeral and dynamic policies, authentication, spatial distribution, and information flow. The implementation of Aglet consists of the following ingredients: First, we represent the syntax and proofs of an authorization logic, Garg and Pfennings BL0, using dependent types. Second, we implement a proof search procedure, based on a focused sequent calculus, to ease the burden of constructing proofs. Third, we represent computations using a monad indexed by pre- and post-conditions drawn from the authorization logic, which permits ephemeral policies that change during execution. We describe the implementation of our library and illustrate its use on a number of the benchmark examples considered in the literature.


economics and computation | 2015

Simple Auctions with Simple Strategies

Nikhil R. Devanur; Jamie Morgenstern; Vasilis Syrgkanis; S. Matthew Weinberg

We introduce single-bid auctions as a new format for combinatorial auctions. In single-bid auctions, each bidder submits a single real-valued bid for the right to buy items at a fixed price. Contrary to other simple auction formats, such as simultaneous or sequential single-item auctions, bidders can implement no-regret learning strategies for single-bid auctions in polynomial time. Price of anarchy bounds for correlated equilibria concepts in single-bid auctions therefore have more bite than their counterparts for auctions and equilibria for which learning is not known to be computationally tractable (or worse, known to be computationally intractable [Cai and Papadimitriou 2014; Dobzinski et al. 2015] this end, we show that for any subadditive valuations the social welfare at equilibrium is an O(log m)-approximation to the optimal social welfare, where


workshop on internet and network economics | 2016

Strategic Network Formation with Attack and Immunization

Sanjeev Goyal; Shahin Jabbari; Michael J. Kearns; Sanjeev Khanna; Jamie Morgenstern

m


economics and computation | 2016

Simple Mechanisms for Agents with Complements

Michal Feldman; Ophir Friedler; Jamie Morgenstern; Guy Reiner

is the number of items. We also provide tighter approximation results for several subclasses. Our welfare guarantees hold for Nash equilibria and no-regret learning outcomes in both Bayesian and complete information settings via the smooth-mechanism framework. Of independent interest, our techniques show that in a combinatorial auction setting, efficiency guarantees of a mechanism via smoothness for a very restricted class of cardinality valuations extend, with a small degradation, to subadditive valuations, the largest complement-free class of valuations.


economics and computation | 2017

Fairness Incentives for Myopic Agents

Sampath Kannan; Michael J. Kearns; Jamie Morgenstern; Mallesh M. Pai; Aaron Roth; Rakesh V. Vohra; Zhiwei Steven Wu

Strategic network formation arises in settings where agents receive some benefit from their connectedness to other agents, but also incur costs for forming these links. We consider a new network formation game that incorporates an adversarial attack, as well as immunization or protection against the attack. An agents network benefit is the expected size of her connected component post-attack, and agents may also choose to immunize themselves from attack at some additional cost. Our framework can be viewed as a stylized model of settings where reachability rather than centrality is the primary interest as in many technological networks such as the Internet, and vertices may be vulnerable to attacks such as viruses, but may also reduce risk via potentially costly measures such as an anti-virus software. Our main theoretical contributions include a strong bound on the edge density at equilibrium. In particular, we show that under a very mild assumption on the adversarys attack model, every equilibrium network contains at most only


international workshop and international workshop on approximation, randomization, and combinatorial optimization. algorithms and techniques | 2012

Additive Approximation for Near-Perfect Phylogeny Construction

Pranjal Awasthi; Avrim Blum; Jamie Morgenstern; Or Sheffet


international workshop on security | 2011

A proof-carrying file system with revocable and use-once certificates

Jamie Morgenstern; Deepak Garg; Frank Pfenning

2n-4


national conference on artificial intelligence | 2012

On maxsum fair cake divisions

Steven J. Brams; Michal Feldman; John K. Lai; Jamie Morgenstern; Ariel D. Procaccia


neural information processing systems | 2015

On the Pseudo-Dimension of Nearly Optimal Auctions

Jamie Morgenstern; Tim Roughgarden

2n-4 edges for


neural information processing systems | 2016

Fairness in Learning: Classic and Contextual Bandits.

Matthew Joseph; Michael J. Kearns; Jamie Morgenstern; Aaron Roth

Collaboration


Dive into the Jamie Morgenstern's collaboration.

Top Co-Authors

Avatar

Aaron Roth

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Michael J. Kearns

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Matthew Joseph

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Avrim Blum

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Sampath Kannan

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Shahin Jabbari

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Seth Neel

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhiwei Steven Wu

University of Pennsylvania

View shared research outputs
Researchain Logo
Decentralizing Knowledge