False-name manipulations • In highly anonymous environments such as the Internet, an agent can pretend to be multiple agents. • A mechanism is false-name-proof (FNP) if for each agent, truthful telling by using a single identifier (although he can use multiple identifiers) is a dominant strategy. – In combinatorial auctions, even theoretically well-founded Vickrey-Clarke-Groves mechanism is not FNP (i.e., vulnerable against false-name manipulations). Online Mechanism Design • Mechanism Design has focused on static (offline) environments. – All agents arrive and depart simultaneously. • In real electronic markets, each agent arrives and departs over time. • Mechanism must make decisions dynamically without knowledge of the future. Summary • ...
This paper analyzes the worst-case efficiency ratio of false-name-proof combinatorial auction mechan...
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. On...
In open, anonymous environments such as the Internet, mechanism design is complicated by the fact th...
False-name manipulations • In highly anonymous environments such as the Internet, an agent can prete...
In Internet auctions, it is easy for a bidder to submit multiple bids under multiple identifiers (e....
In Internet auctions, it is easy for a bidder to submit multiple bids under multiple identifiers (e....
In open, anonymous environments such as the Internet, mechanism design is complicated by the fact th...
AbstractThis paper presents a new combinatorial auction protocol that is robust against false-name b...
Combinatorial auctions are multiple-item auctions in which bidders may place bids on any package (su...
AbstractThis paper presents a new combinatorial auction protocol that is robust against false-name b...
This paper presents a new combinatorial auction protocol (LDS protocol) that is robust against false...
The basic notion of false-name-proofness allows for useful mechanisms under certain circumstances, b...
Session A2 - Algorithmic Game Theory IAlthough the celebrated Vickrey auction is strategy-proof and ...
Electronic Commerce (EC) has rapidly grown with the expansion of the Internet. Among these activi-ti...
This paper analyzes the worst-case efficiency ratio of false-name-proof combinatorial auction mechan...
This paper analyzes the worst-case efficiency ratio of false-name-proof combinatorial auction mechan...
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. On...
In open, anonymous environments such as the Internet, mechanism design is complicated by the fact th...
False-name manipulations • In highly anonymous environments such as the Internet, an agent can prete...
In Internet auctions, it is easy for a bidder to submit multiple bids under multiple identifiers (e....
In Internet auctions, it is easy for a bidder to submit multiple bids under multiple identifiers (e....
In open, anonymous environments such as the Internet, mechanism design is complicated by the fact th...
AbstractThis paper presents a new combinatorial auction protocol that is robust against false-name b...
Combinatorial auctions are multiple-item auctions in which bidders may place bids on any package (su...
AbstractThis paper presents a new combinatorial auction protocol that is robust against false-name b...
This paper presents a new combinatorial auction protocol (LDS protocol) that is robust against false...
The basic notion of false-name-proofness allows for useful mechanisms under certain circumstances, b...
Session A2 - Algorithmic Game Theory IAlthough the celebrated Vickrey auction is strategy-proof and ...
Electronic Commerce (EC) has rapidly grown with the expansion of the Internet. Among these activi-ti...
This paper analyzes the worst-case efficiency ratio of false-name-proof combinatorial auction mechan...
This paper analyzes the worst-case efficiency ratio of false-name-proof combinatorial auction mechan...
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. On...
In open, anonymous environments such as the Internet, mechanism design is complicated by the fact th...