text
stringlengths 0
32
|
---|
intermediate B-KEY |
nodes I-KEY |
may O |
choose O |
to O |
forward O |
packets O |
at O |
a O |
low O |
priority B-KEY |
or O |
simply O |
not O |
forward O |
packets O |
at O |
all O |
. O |
Using O |
a O |
principal-agent O |
model O |
, O |
we O |
show O |
how O |
the O |
hidden-action O |
problem O |
can O |
be O |
overcome O |
through O |
appropriate O |
design O |
of O |
contracts B-KEY |
, O |
in O |
both O |
the O |
direct O |
-LRB- O |
the O |
endpoints B-KEY |
contract B-KEY |
with O |
each O |
individual O |
router O |
-RRB- O |
and O |
recursive O |
-LRB- O |
each O |
router O |
contracts B-KEY |
with O |
the O |
next O |
downstream O |
router O |
-RRB- O |
cases O |
. O |
We O |
further O |
demonstrate O |
that O |
per-hop O |
monitoring O |
does O |
not O |
necessarily O |
improve O |
the O |
utility O |
of O |
the O |
principal O |
or O |
the O |
social O |
welfare O |
in O |
the O |
system O |
. O |
In O |
addition O |
, O |
we O |
generalize O |
existing O |
mechanisms B-KEY |
that O |
deal O |
with O |
hidden-information O |